Impact
Veeam Backup and Replication allows a low‑privileged user to extract stored SSH credentials, revealing authentication secrets that may be reused against remote systems managed by the backup appliance. The vulnerability is based on the weakness CWE‑522, a failure to protect credentials during storage or transmission. If exploited, an attacker can obtain valid SSH credentials, enabling further unauthorized access or lateral movement within an organization.
Affected Systems
The affected product is Veeam Backup and Replication. Specific product versions are not listed, so any current release that does not include the vendor’s fix may be vulnerable. The risk applies to all instances that store or cache SSH credentials for remote host access.
Risk and Exploitability
The CVSS score of 7.7 indicates a high severity impact if the flaw is exploited. The EPSS score of less than 1% suggests that exploitation is currently unlikely, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires a local low‑privileged account on the Veeam appliance; based on the description, it is inferred that the attacker must have such access in order to read the cached credentials. No publicly available exploits have been disclosed, so the risk remains primarily theoretical until an attacker acquires local access.
OpenCVE Enrichment