--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: The Cybersecurity Service for the Union institutions, bodies, offices and agencies title: 'Critical Vulnerability in Veeam Backup & Replication' number: '2025-021' version: '1.0' original_date: '2025-06-17' date: '2025-06-18' --- _History:_ * _18/06/2025 --- v1.0 -- Initial publication_ # Summary On 17 June 2025, Veeam released an advisory addressing several vulnerabilities in Veeam Backup & Replication, one of which is rated as critical [1]. It is recommended updating as soon as possible. # Technical Details The vulnerability **CVE-2025-23121**, with a CVSS score of 9.9, is a flaw allowing remote code execution (RCE) on the Backup Server by an authenticated domain user. This vulnerability only impacts domain-joined backup servers. It is said that this vulnerability is likely a bypass of the fix, released in March 2025, addressing the vulnerability **CVE-2025-23120** [2,3]. # Affected Products This vulnerability impacts Veeam Backup & Replication version 12 builds, including 12.3.1.1139 (addressed in 12.3.2 (build 12.3.2.3617)). The vendor notes that unsupported product versions are not tested, but are likely affected and should be considered vulnerable [1]. # Recommendations It is recommended updating as soon as possible, and implementing best practices provided by the vendor [4]. # References [1] [2] [3] [4]