Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21708: Vulnerability in Veeam Backup and Recovery

0
Critical
VulnerabilityCVE-2026-21708cvecve-2026-21708
Published: Thu Mar 12 2026 (03/12/2026, 16:26:52 UTC)
Source: CVE Database V5
Vendor/Project: Veeam
Product: Backup and Recovery

Description

A vulnerability allowing a Backup Viewer to perform remote code execution (RCE) as the postgres user.

AI-Powered Analysis

AILast updated: 03/12/2026, 17:59:06 UTC

Technical Analysis

CVE-2026-21708 is a critical vulnerability identified in Veeam Backup and Recovery software versions 12.3.2 and 13.0.1. The flaw permits a user assigned the Backup Viewer role to perform remote code execution (RCE) with the privileges of the postgres user. The postgres user typically has significant database privileges, which could allow an attacker to manipulate backup data, exfiltrate sensitive information, or disrupt backup services. The vulnerability has a CVSS 3.1 base score of 10.0, reflecting its critical nature: it can be exploited remotely over the network (AV:N), requires low attack complexity (AC:L), requires privileges (PR:L) but no user interaction (UI:N), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The scope is changed (S:C), indicating that exploitation affects resources beyond the initially vulnerable component. Although no public exploits have been reported yet, the severity and ease of exploitation make this a high-priority issue. The vulnerability was reserved in early January 2026 and published in March 2026. The lack of available patches at the time of disclosure necessitates immediate attention to access controls and monitoring. The vulnerability arises from improper privilege separation or insufficient input validation in the Backup Viewer functionality, enabling escalation to postgres user context remotely.

Potential Impact

The impact of CVE-2026-21708 is severe for organizations using affected Veeam Backup and Recovery versions. Successful exploitation allows attackers with Backup Viewer access to execute arbitrary code as the postgres user, potentially leading to full system compromise of backup infrastructure. This can result in unauthorized data access, manipulation or deletion of backup data, disruption of backup and recovery processes, and potential lateral movement within the network. Given that backups often contain sensitive and critical data, the confidentiality and integrity of organizational data are at significant risk. Availability of backup services may also be compromised, affecting disaster recovery capabilities. The vulnerability could be leveraged by insider threats or external attackers who gain Backup Viewer credentials. The criticality is amplified in environments where Veeam is used to protect essential services, including financial institutions, healthcare providers, government agencies, and large enterprises. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates imminent risk if exploited.

Mitigation Recommendations

1. Immediately restrict Backup Viewer role assignments to only trusted personnel and review existing permissions to minimize exposure. 2. Monitor logs and network activity for unusual behavior from accounts with Backup Viewer privileges, focusing on anomalous database or system commands. 3. Implement network segmentation to isolate backup infrastructure from general user networks, reducing attack surface. 4. Apply principle of least privilege to all Veeam roles and related database users, especially the postgres user. 5. Await and promptly apply official patches or updates from Veeam addressing CVE-2026-21708 once released. 6. Consider deploying application-layer firewalls or intrusion detection systems to detect and block suspicious RCE attempts targeting backup services. 7. Conduct internal audits and penetration tests focusing on backup environment security to identify and remediate related weaknesses. 8. Educate administrators and security teams about this vulnerability to ensure rapid response and containment if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-04T15:00:06.573Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b2fb902f860ef943d10b77

Added to database: 3/12/2026, 5:44:48 PM

Last enriched: 3/12/2026, 5:59:06 PM

Last updated: 3/12/2026, 8:22:55 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses