A vulnerability allowing remote code execution (RCE) for domain users.
References
Link | Resource |
---|---|
https://www.veeam.com/kb4724 | Vendor Advisory |
https://labs.watchtowr.com/by-executive-order-we-are-banning-blacklists-domain-level-rce-in-veeam-backup-replication-cve-2025-23120/ | Exploit Third Party Advisory |
Configurations
History
02 Apr 2025, 16:01
Type | Values Removed | Values Added |
---|---|---|
First Time |
Veeam
Veeam veeam Backup \& Replication |
|
References | () https://www.veeam.com/kb4724 - Vendor Advisory | |
References | () https://labs.watchtowr.com/by-executive-order-we-are-banning-blacklists-domain-level-rce-in-veeam-backup-replication-cve-2025-23120/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
Summary |
|
20 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-502 |
20 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 16:15
Updated : 2025-04-02 16:01
NVD link : CVE-2025-23120
Mitre link : CVE-2025-23120
CVE.ORG link : CVE-2025-23120
JSON object : View
Products Affected
veeam
- veeam_backup_\&_replication
CWE
CWE-502
Deserialization of Untrusted Data