Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21672: Vulnerability in Veeam Backup and Recovery

0
High
VulnerabilityCVE-2026-21672cvecve-2026-21672
Published: Thu Mar 12 2026 (03/12/2026, 16:26:52 UTC)
Source: CVE Database V5
Vendor/Project: Veeam
Product: Backup and Recovery

Description

A vulnerability allowing local privilege escalation on Windows-based Veeam Backup & Replication servers.

AI-Powered Analysis

AILast updated: 03/12/2026, 17:59:24 UTC

Technical Analysis

CVE-2026-21672 is a vulnerability identified in Veeam Backup & Replication software versions 12.3.2 and 13.0.1 running on Windows servers. It enables local privilege escalation (LPE), allowing an attacker who already has limited local access to elevate their privileges to SYSTEM level. This escalation can compromise the confidentiality, integrity, and availability of backup data and the backup server itself. The vulnerability does not require user interaction and has a low attack complexity, making it easier to exploit once local access is obtained. The scope is significant as it affects core backup infrastructure, potentially enabling attackers to manipulate backup data, disable backup operations, or use the backup server as a pivot point for further network compromise. Although no public exploits are known at this time, the high CVSS score (8.8) and the critical nature of backup systems underscore the urgency of addressing this flaw. The vulnerability was reserved in early 2026 and published in March 2026, with no patch links currently provided, indicating that organizations must monitor vendor advisories closely. The vulnerability’s impact is compounded by the fact that backup servers often hold sensitive data and are trusted components in enterprise environments.

Potential Impact

The exploitation of CVE-2026-21672 can have severe consequences for organizations worldwide. Attackers gaining SYSTEM-level privileges on backup servers can access or modify sensitive backup data, potentially leading to data breaches or data loss. They can also disrupt backup and recovery operations, undermining disaster recovery capabilities and business continuity. This can facilitate ransomware attacks by corrupting backup data or disabling backups, leaving organizations without recovery options. Furthermore, compromised backup servers can serve as a foothold for lateral movement within networks, increasing the risk of broader compromise. The impact extends to regulatory compliance failures if backup data confidentiality or integrity is violated. Organizations in sectors with critical infrastructure, financial services, healthcare, and government are particularly vulnerable due to their reliance on secure backup solutions.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following measures: 1) Restrict local access to Veeam Backup & Replication servers strictly to trusted administrators and service accounts to minimize the risk of initial access. 2) Employ strong endpoint protection and monitoring solutions to detect unusual privilege escalation attempts or suspicious activities on backup servers. 3) Apply the official patches or updates from Veeam as soon as they become available; monitor Veeam’s security advisories regularly. 4) Use application whitelisting and least privilege principles to limit the ability of unauthorized users or processes to execute code or escalate privileges. 5) Conduct regular audits of user accounts and permissions on backup servers to ensure no unnecessary privileges are granted. 6) Implement network segmentation to isolate backup servers from general user workstations and limit lateral movement opportunities. 7) Maintain offline or immutable backups as an additional safeguard against backup data tampering. 8) Educate administrators about the risks of local privilege escalation and encourage prompt reporting of suspicious behavior.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-02T15:00:02.872Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b2fb902f860ef943d10b73

Added to database: 3/12/2026, 5:44:48 PM

Last enriched: 3/12/2026, 5:59:24 PM

Last updated: 3/12/2026, 8:05:49 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses