CISA warns of NAKIVO Backup & Replication vulnerability

Sicherheit (Pexels, allgemeine Nutzung)[German]Does anyone in the readership use NAKIVO Backup & Replication for data backup? The US Cybersecurity Agency CISA has published a warning regarding a vulnerability in this solution. Administrators should apply the latest security updates.


Advertising

NAKIVO Backup & Replication

I had a quick look, NAKIVO Backup & Replication is offered in different countries, also in Germany. It is a backup solution that supports various platforms such as Windows, Linux, Amazon EC2, but also virtualization environments such as VMware, Proxmox, Hyper-V, Nutanix, etc.

NAKIVO Backup & Replication

NAKIVO seems to be an alternative to Veeam. The solution for backup and replication is faster, cheaper and more reliable than Veeam. NAKIVO has a global network of over 8,000 partners and over 30,000 active customers in 183 countries. Companies such as Honda, Cisco, Coca-Cola and Siemens use this software internally.

Vulnerability CVE-2024-48248 is actively exploited

The entry CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability was added to the Known Exploited Vulnerabilities Catalog on March 19, 2025. Entries of vulnerabilities in products in this catalog mean that the vulnerabilities are actively exploited in the wild by attackers.

Details about CVE-2024-48248

NAKIVO Backup & Replication prior to version 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router. This can lead to remote code execution across the organization as PhysicalDiscovery has clear text credentials.


Advertising

WatchTwr Labs disclosed the vulnerability in this post at the end of February 2025. NAKIVO had already patched the vulnerability as of November 4, 2024 in version 110 (see here).

CISA warning

The colleagues from Bleeping Computer have taken up the CISA warning in this article. CISA has warned US federal agencies to secure their networks against attacks that exploit the CVE-2024-48248 vulnerability in NAKIVO's backup & replication software.

US Federal Civilian Executive Branch (FCEB) agencies now have three weeks, until April 9, to secure their systems against attacks. Does anyone in the readership use this software, and is it updated?


Advertising

This entry was posted in Security, Software and tagged , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: Please note the rules for commenting on the blog (first comments and linked posts end up in moderation, I release them every few hours, I rigorously delete SEO posts/SPAM).