Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-27532: Missing Authentication for Critical Function (CWE-306) in Veeam Backup & Replication

0
High
VulnerabilityCVE-2023-27532cvecve-2023-27532cwe-306
Published: Fri Mar 10 2023 (03/10/2023, 00:00:00 UTC)
Source: CVE Database V5
Product: Veeam Backup & Replication

Description

Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts.

AI-Powered Analysis

AILast updated: 10/28/2025, 22:57:13 UTC

Technical Analysis

CVE-2023-27532 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Veeam Backup & Replication software. The vulnerability allows unauthenticated attackers to access encrypted credentials stored within the configuration database of the backup software. These credentials are critical as they enable access to backup infrastructure hosts, which are central to data protection and disaster recovery processes. The flaw exists because a critical function that handles these credentials lacks proper authentication checks, allowing remote attackers to retrieve sensitive information without any privileges or user interaction. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (network vector, no privileges required, no user interaction) and the high confidentiality impact (exposure of encrypted credentials). However, the integrity and availability impacts are rated as none. The vulnerability affects versions prior to the fixed releases: v12 build 12.0.0.1420 and 11a build 11.0.1.1261. While no known exploits have been reported in the wild, the potential for attackers to leverage this vulnerability to compromise backup infrastructure is significant, as backup systems often contain sensitive and critical organizational data. The vulnerability was publicly disclosed in March 2023, with patches available but no direct exploit code reported yet.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the confidentiality of backup credentials, which could lead to unauthorized access to backup servers and potentially to the broader IT environment. Compromise of backup infrastructure can result in exposure or manipulation of backup data, undermining data integrity and recovery capabilities. This is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government agencies. Attackers exploiting this vulnerability could bypass authentication controls, leading to stealthy credential theft and lateral movement within networks. The impact is heightened in environments where backups are a primary defense against ransomware or data loss, as attackers gaining access to backup systems can disable or corrupt backups, complicating recovery efforts. The absence of known exploits does not diminish the threat, as the vulnerability's characteristics make it an attractive target for attackers seeking to infiltrate critical infrastructure. Organizations relying heavily on Veeam Backup & Replication must consider this vulnerability a high priority to avoid potential data breaches and operational disruptions.

Mitigation Recommendations

1. Immediately apply the patches released by Veeam for versions 12.0.0.1420 and 11.0.1.1261 or later to remediate the vulnerability. 2. Restrict network access to Veeam Backup & Replication servers by implementing strict firewall rules and network segmentation, limiting exposure to trusted management networks only. 3. Employ multi-factor authentication (MFA) and strong access controls on all management interfaces and backup infrastructure components to reduce risk from credential compromise. 4. Regularly audit and monitor access logs and configuration database queries for anomalous or unauthorized access attempts related to backup credentials. 5. Encrypt backup data at rest and in transit using strong cryptographic protocols to mitigate risks if credentials are compromised. 6. Conduct regular security assessments and penetration testing focused on backup infrastructure to identify and remediate potential weaknesses. 7. Develop and test incident response plans specifically addressing backup infrastructure compromise scenarios to ensure rapid containment and recovery. 8. Educate IT and security teams about this vulnerability and the importance of securing backup systems as part of the overall cybersecurity posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2023-03-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a7247d717aace218e2

Added to database: 10/21/2025, 7:06:15 PM

Last enriched: 10/28/2025, 10:57:13 PM

Last updated: 10/30/2025, 3:48:38 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats