Veeam Patches High Severity Vulnerability As Exploitation Of Previous Flaw Expands

The latest and trending news from around the world.

Veeam Patches High-Severity Vulnerability as Exploitation of Previous Flaw Expands
Veeam Patches High-Severity Vulnerability as Exploitation of Previous Flaw Expands from

Veeam Patches High-Severity Vulnerability as Exploitation of Previous Flaw Expands

Zero-day vulnerability exploited in the wild

Veeam has released a patch for a high-severity vulnerability (CVE-2023-23573) in its Backup & Replication software that allows remote attackers to execute arbitrary code on vulnerable systems. The vulnerability, which was disclosed on August 10, 2023, is a privilege escalation flaw that could allow attackers to gain SYSTEM privileges on affected systems.

Veeam has also confirmed that the vulnerability has been exploited in the wild, and has urged customers to patch their systems as soon as possible.

What is the vulnerability?

The vulnerability is caused by a flaw in the way that Veeam Backup & Replication handles permissions for certain files and directories. An attacker could exploit this vulnerability by tricking a Veeam Backup & Replication user into opening a specially crafted file or folder, which could then allow the attacker to execute arbitrary code on the affected system.

Who is affected by the vulnerability?

The vulnerability affects all versions of Veeam Backup & Replication prior to version 11.0.1.3209.

What should you do?

Veeam has released a patch for the vulnerability, which can be downloaded from the Veeam website. Customers are urged to patch their systems as soon as possible.

In addition to patching, customers can also take the following steps to mitigate the risk of exploitation:

For more information, please refer to Veeam's security advisory: https://www.veeam.com/security-advisory-veeam-backup-replication-high-severity-vulnerability-cve-2023-23573.html