Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59470: Vulnerability in Veeam Backup and Recovery

0
Critical
VulnerabilityCVE-2025-59470cvecve-2025-59470
Published: Thu Jan 08 2026 (01/08/2026, 16:18:20 UTC)
Source: CVE Database V5
Vendor/Project: Veeam
Product: Backup and Recovery

Description

This vulnerability allows a Backup Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

AI-Powered Analysis

AILast updated: 01/15/2026, 17:11:51 UTC

Technical Analysis

CVE-2025-59470 is a critical vulnerability identified in Veeam Backup and Recovery version 13.0.0 that enables remote code execution (RCE) by a user with Backup Operator privileges. The flaw arises from improper sanitization of the 'interval' or 'order' parameters, which are susceptible to command injection (classified under CWE-77). An attacker with Backup Operator rights can craft malicious input to execute arbitrary commands as the postgres user, a privileged database user within the backup system. This vulnerability does not require user interaction but does require the attacker to have Backup Operator level access, which is typically granted to trusted personnel or automated backup processes. The CVSS v3.1 score of 9.0 reflects the vulnerability's critical nature, with network attack vector (AV:N), low attack complexity (AC:L), and high privileges required (PR:H). The scope is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The impact on confidentiality and integrity is high, as attackers can manipulate backup data or exfiltrate sensitive information. Availability impact is low but still present. Although no exploits have been reported in the wild yet, the vulnerability poses a significant risk to organizations relying on Veeam Backup and Recovery for data protection. The lack of an official patch at the time of publication necessitates immediate mitigation efforts. Given the strategic importance of backup systems, exploitation could lead to severe operational disruption and data compromise.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the integrity and confidentiality of critical backup data. Successful exploitation could allow attackers to execute arbitrary code within the backup environment, potentially leading to unauthorized data access, manipulation, or deletion. This could undermine disaster recovery capabilities and lead to prolonged downtime or data loss. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened regulatory and reputational risks. The criticality of backup infrastructure means that compromise could cascade into broader IT environment impacts. Additionally, the requirement for Backup Operator privileges means insider threats or compromised administrative accounts could be leveraged. The absence of known exploits currently provides a window for proactive defense, but the high severity demands urgent attention to prevent future attacks.

Mitigation Recommendations

1. Immediately audit and restrict Backup Operator privileges to the minimum necessary personnel and processes. 2. Implement strict access controls and monitoring on backup systems to detect anomalous commands or parameter usage related to 'interval' or 'order'. 3. Employ network segmentation to isolate backup infrastructure from general user networks, limiting exposure. 4. Use application whitelisting and endpoint detection to identify suspicious activities involving the postgres user or backup processes. 5. Regularly review and update credentials associated with backup operators to prevent unauthorized access. 6. Monitor vendor communications closely for official patches or updates addressing this vulnerability and apply them promptly upon release. 7. Consider temporary compensating controls such as disabling vulnerable features or restricting input parameters if feasible until patches are available. 8. Conduct security awareness training for administrators emphasizing the risks of privilege misuse and command injection attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-09-16T15:00:07.876Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695fd9d02717593a334c2bd8

Added to database: 1/8/2026, 4:22:40 PM

Last enriched: 1/15/2026, 5:11:51 PM

Last updated: 2/7/2026, 12:41:19 PM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats