Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN364 _____________________________________________________________________ DATE : 18/06/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Veeam Backup & Replication versions prior to 12.3.2 (build 12.3.2.3617), Veeam Agent for Microsoft Windows versions prior to 6.3.2 (build 6.3.2.1205). ===================================================================== https://www.veeam.com/kb4743 _____________________________________________________________________ Vulnerabilities Resolved in Veeam Backup & Replication 12.3.2 KB ID: 4743 Product: Veeam Backup & Replication | 12 | 12.1 | 12.2 | 12.3 | 12.3.1 Veeam Agent for Microsoft Windows | 6.0 | 6.1 | 6.2 | 6.3 | 6.3.1 Published: 2025-06-17 Last Modified: 2025-06-17 By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice. All vulnerabilities documented in this article were resolved in Veeam Backup & Replication 12.3.2. Veeam Software Security Commitment Veeam® is committed to ensuring its products protect customers from potential risks. As part of that commitment, we operate a Vulnerability Disclosure Program (VDP) for all Veeam products and perform extensive internal code audits. When a vulnerability is identified, our team promptly develops a patch to address and mitigate the risk. In line with our dedication to transparency, we publicly disclose the vulnerability and provide detailed mitigation information. This approach ensures that all potentially affected customers can quickly implement the necessary measures to safeguard their systems. It’s important to note that once a vulnerability and its associated patch are disclosed, attackers will likely attempt to reverse-engineer the patch to exploit unpatched deployments of Veeam software. This reality underscores the critical importance of ensuring that all customers use the latest versions of our software and install all updates and patches without delay. Issue Details CVE-2025-23121 A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user. Severity: Critical CVSS v3.0 Score: 9.9 Source: Reported by watchTowr and CodeWhite. Note: This vulnerability only impacts domain-joined backup servers. Veeam Backup & Replication Security Best Practice Guide > Workgroup or Domain? Affected Product Veeam Backup & Replication 12.3.1.1139 and all earlier version 12 builds. Note: Unsupported product versions are not tested, but are likely affected and should be considered vulnerable. Solution This vulnerability was fixed starting in the following build: Veeam Backup & Replication 12.3.2 (build 12.3.2.3617) CVE-2025-24286 A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code. Severity: High CVSS v3.1 Score: 7.2 Source: Reported by Nikolai Skliarenko with Trend Micro. Affected Product Veeam Backup & Replication 12.3.1.1139 and all earlier version 12 builds. Note: Unsupported product versions are not tested, but are likely affected and should be considered vulnerable. Solution This vulnerability was fixed starting in the following build: Veeam Backup & Replication 12.3.2 (build 12.3.2.3617) CVE-2025-24287 A vulnerability allowing local system users to modify directory contents, allowing for arbitrary code execution on the local system with elevated permissions. Severity: Medium CVSS v3.1 Score: 6.1 Source: Reported by CrisprXiang working with Trend Micro Zero Day Initiative. Affected Product Veeam Agent for Microsoft Windows 6.3.1.1074 and all earlier version 6 builds. Note: Unsupported product versions are not tested, but are likely affected and should be considered vulnerable. Solution This vulnerability was fixed starting in the following build: Veeam Agent for Microsoft Windows 6.3.2 (build 6.3.2.1205) Veeam Agent for Microsoft Windows is included with Veeam Backup & Replication and available as a standalone application. ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================