A critical vulnerability, CVE-2025-23114, has been identified in the Veeam Updater component, which is integral to multiple Veeam backup solutions. This flaw allows attackers to execute arbitrary code on affected servers via Man-in-the-Middle (MitM) attacks, potentially granting them root-level access. The severity of this vulnerability is underscored by its high severity score of 9.0, highlighting the significant risk it poses to organizations using Veeam backup products. If exploited, the flaw could lead to severe consequences, including data breaches, ransomware deployment, or unauthorized persistent access within an organization’s infrastructure.
The issue arises due to insecure communication channels within the Veeam Updater component when transmitting sensitive data. Attackers positioned between the vulnerable appliance and its update server can intercept and manipulate update requests, injecting malicious code into the process. This enables attackers to take complete control over the system, exploiting the vulnerability to potentially compromise entire networks. The flaw affects a wide range of Veeam products, including Veeam Backup for Salesforce, AWS, Microsoft Azure, Google Cloud, and more.
These products are used by various organizations, making this vulnerability especially concerning for businesses relying on Veeam for backup and disaster recovery solutions.
Veeam has addressed the vulnerability in newer versions of its software, releasing updated versions of the Veeam Updater component that fix the issue. Automatic updates are enabled by default for all actively supported backup appliances, meaning most users will receive the fix without manual intervention. For users running affected versions, Veeam has provided specific update versions to resolve the vulnerability. Organizations using older versions are at risk if the necessary updates are not applied promptly. However, deployments running Veeam Backup & Replication version 12.3 with updated appliances are unaffected by the flaw.
To mitigate the risk, administrators are advised to use the built-in Veeam Updater tool to ensure their appliances are running the fixed versions. It is also recommended that organizations check their system logs to confirm that the updated version of the Updater component is installed. Prompt software updates and additional security measures, such as network monitoring and isolating backup appliances from external access, are critical for protecting against this vulnerability. This incident highlights the importance of maintaining up-to-date software in backup systems and emphasizes the need for proactive security practices in managing critical infrastructure.