Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21667: Vulnerability in Veeam Backup and Replication

0
Critical
VulnerabilityCVE-2026-21667cvecve-2026-21667
Published: Thu Mar 12 2026 (03/12/2026, 15:09:39 UTC)
Source: CVE Database V5
Vendor/Project: Veeam
Product: Backup and Replication

Description

CVE-2026-21667 is a critical vulnerability in Veeam Backup and Replication that allows an authenticated domain user to execute remote code on the Backup Server without user interaction. The flaw stems from improper access control (CWE-284), enabling privilege escalation and full system compromise. With a CVSS score of 10. 0, this vulnerability impacts confidentiality, integrity, and availability severely. Although no known exploits are currently in the wild, the ease of exploitation and the critical nature of backup infrastructure make this a high-risk threat. Organizations relying on Veeam Backup and Replication should prioritize patching once available and implement strict access controls. Countries with significant Veeam market penetration and critical infrastructure reliance on backup solutions are at heightened risk. Immediate mitigation steps include restricting domain user permissions, monitoring for suspicious activity, and isolating backup servers from unnecessary network exposure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:43:34 UTC

Technical Analysis

CVE-2026-21667 is a critical security vulnerability identified in Veeam Backup and Replication software, a widely used enterprise backup solution. The vulnerability allows any authenticated domain user to perform remote code execution (RCE) on the Backup Server, effectively enabling an attacker with legitimate domain credentials to execute arbitrary code remotely. This vulnerability arises due to improper access control (classified under CWE-284), which fails to adequately restrict privileged operations within the backup software. The CVSS v3.1 base score of 10.0 reflects the highest severity, indicating that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), needs only low privileges (PR:L), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, and it impacts confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized rapidly. The lack of currently available patches necessitates immediate risk mitigation by administrators. The vulnerability compromises the core backup infrastructure, potentially allowing attackers to manipulate backup data, disrupt recovery processes, or use the backup server as a pivot point for further network compromise.

Potential Impact

The impact of CVE-2026-21667 is severe for organizations globally, especially those relying heavily on Veeam Backup and Replication for critical data protection and disaster recovery. Successful exploitation can lead to complete system compromise of the backup server, allowing attackers to execute arbitrary code with elevated privileges. This can result in unauthorized access to sensitive backup data, manipulation or deletion of backups, disruption of backup and recovery operations, and potential lateral movement within the network. The compromise of backup infrastructure undermines an organization's ability to recover from ransomware or other cyberattacks, significantly increasing operational risk and potential downtime. Additionally, attackers could leverage this foothold to escalate privileges further or deploy persistent malware, impacting overall organizational security posture. The criticality of backup servers as trusted components makes this vulnerability particularly dangerous, as it can bypass many traditional security controls.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict domain user permissions strictly on the backup server, ensuring only necessary administrative accounts have access. 2) Employ network segmentation to isolate the backup server from general user networks and limit exposure to only trusted management systems. 3) Enable and monitor detailed logging and alerting on the backup server for unusual activities, such as unexpected process executions or privilege escalations. 4) Use multi-factor authentication (MFA) for all accounts with access to the backup infrastructure to reduce the risk of credential compromise. 5) Conduct regular audits of user permissions and remove any unnecessary domain user privileges related to the backup environment. 6) Prepare incident response plans specifically addressing backup infrastructure compromise scenarios. 7) Once patches become available from Veeam, apply them immediately following thorough testing. 8) Consider deploying application whitelisting and endpoint detection and response (EDR) solutions on backup servers to detect and prevent unauthorized code execution.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-02T15:00:02.871Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b2df702f860ef943b15cd8

Added to database: 3/12/2026, 3:44:48 PM

Last enriched: 3/20/2026, 2:43:34 AM

Last updated: 4/28/2026, 7:27:32 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses