Description
A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.
Published: 2026-03-12
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A documented flaw in Veeam Backup & Replication's high‑availability configuration allows an authenticated user with a Backup Administrator role to trigger remote code execution. The vulnerability is classified as a code injection flaw (CWE‑94). If exploited, the attacker can run arbitrary commands with the privileges of the backup appliance, potentially compromising the entire backup infrastructure and any protected data it holds. This can lead to full system compromise, data loss, or malicious data exfiltration.

Affected Systems

The issue affects Veeam backup appliances running the Veeam Backup & Replication suite used in high‑availability deployments. The vendor product listed is Veeam Software Appliance, but no specific version ranges are supplied in the public advisory. Administrators should verify whether their environment includes a HA configuration and refer to the official Veeam knowledge base article for details on affected releases.

Risk and Exploitability

The CVSS score of 9.1 denotes a high severity flaw, but the EPSS score indicates that exploitation is currently considered unlikely (less than 1% probability), and the vulnerability is not yet recorded in the CISA KEV catalog. Attackers would need valid backup‑administrator credentials and network access to the HA component. Once authenticated, exploitation can be performed over the network, so protecting administrative accounts and restricting exposure of the backup appliance remains critical.

Generated by OpenCVE AI on March 31, 2026 at 05:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Veeam patch or upgrade to a version that fixes the flaw, as detailed in the official KB article.
  • Restrict network access to the Veeam backup appliance by enforcing firewall rules or VPN isolation for Backup Administrator accounts.
  • Disable or restrict the HA components if not needed, until a patch is applied.
  • Monitor system logs for suspicious activity related to backup administration and RCE attempts.
  • Ensure that all Backup Administrator accounts use strong, unique credentials and enable multi‑factor authentication if available.

Generated by OpenCVE AI on March 31, 2026 at 05:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Authenticated Remote Code Execution in HA Deployments of Veeam Backup & Replication

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
First Time appeared Veeam veeam Backup \& Replication
Weaknesses CWE-94
CPEs cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*
Vendors & Products Veeam veeam Backup \& Replication

Fri, 20 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Title Authenticated Remote Code Execution in HA Deployments of Veeam Backup & Replication

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Veeam
Veeam software Appliance
Vendors & Products Veeam
Veeam software Appliance

Thu, 12 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Veeam Software Appliance Veeam Backup \& Replication
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2026-03-13T03:55:46.681Z

Reserved: 2026-01-02T15:00:02.872Z

Link: CVE-2026-21671

cve-icon Vulnrichment

Updated: 2026-03-12T15:28:05.309Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T15:16:13.630

Modified: 2026-03-31T13:17:32.803

Link: CVE-2026-21671

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:09:33Z

Weaknesses