{"id":38419,"date":"2025-06-17T21:28:58","date_gmt":"2025-06-17T19:28:58","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=38419"},"modified":"2025-06-17T23:36:02","modified_gmt":"2025-06-17T21:36:02","slug":"veeam-backup-replication-12-3-2-closes-critical-vulnerabilities-cve-2025-23121-etc","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/06\/17\/veeam-backup-replication-12-3-2-closes-critical-vulnerabilities-cve-2025-23121-etc\/","title":{"rendered":"Veeam Backup &#038; Replication 12.3.2 closes critical vulnerabilities (CVE-2025-23121 etc.)"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/06\/17\/veeam-backup-replication-12-3-2-schliesst-kritische-schwachstellen-cve-2025-23121-etc\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Users of Veeam Backup &amp; Replication must react. The provider Veeam has released Veeam Backup &amp; Replication 12.3.2 and Veeam Agent for Microsoft Windows 6.3.2 on June 17, 2025. Among other things, Veeam Backup &amp; Replication 12.3.2 closes a critical Remote Code Execution (RCE) vulnerability CVE-2025-23121 in (domain-joined) backup servers.<\/p>\n<p><!--more--><\/p>\n<p>I have been informed about this software release and a Veeam security warning by some readers (e.g. <a href=\"https:\/\/www.borncity.com\/blog\/2025\/03\/19\/veeam-backup-replication-rce-schwachstelle-cve-2025-23120\/#comment-220269\" target=\"_blank\" rel=\"noopener\">here<\/a>) in the last few hours (thanks for that). Fritz also wrote in the discussion area that Veeam has released an advisory <a href=\"https:\/\/www.veeam.com\/kb4743\" target=\"_blank\" rel=\"noopener\">kb4743: Vulnerabilities Resolved in Veeam Backup &amp; Replication 12.3.2<\/a>,. The following products are affected:<\/p>\n<ul>\n<li>Veeam Backup &amp; Replication | 12 | 12.1 | 12.2 | 12.3 | 12.3.1<\/li>\n<li>Veeam Agent <i>for Microsoft Windows<\/i>\u00a0| 6.0 | 6.1 | 6.2 | 6.3 | 6.3.1<\/li>\n<\/ul>\n<p>and the updates closes the following vulnerabilities:<\/p>\n<ul>\n<li>CVE-2025-23121 (CVSS v3.0 Score: <span aria-expanded=\"false\">9.9; Critical): A vulnerability that allows remote code execution (RCE) on the backup server by an authenticated domain user.<\/span><\/li>\n<li>CVE-2025-24286 (CVSS v3.1 Score: <span aria-expanded=\"false\">7.2; High): A vulnerability that allows an authenticated user with the \"Backup Operator\" role to modify backup jobs, which could result in the execution of arbitrary code.<\/span><\/li>\n<li>CVE-2025-24287 (CVSS v3.1 Score: 6.1<span aria-expanded=\"false\">; High): A vulnerability that allows local system users to modify the contents of directories, allowing the execution of arbitrary code on the local system with elevated privileges.<\/span><\/li>\n<\/ul>\n<p>Actually, CVE-2025-23121 should not be exploitable because the recommendation is not to include backup servers in a domain. But some such constellations are likely to exist.<\/p>\n<p>The vulnerabilities CVE-2025-23121 and CVE-2025-24286 affect Veeam Backup &amp; Replication 12.3.1.1139 and earlier builds. The vulnerabilities are fixed in <a href=\"https:\/\/www.veeam.com\/kb4696\" target=\"_blank\" rel=\"noopener\">Veeam Backup &amp; Replication 12.3.2 (build 12.3.2.3617)<\/a>.<\/p>\n<p>Affected by CVE-2025-24287 are Veeam Agent for Microsoft Windows 6.3.1.1074 and all previous builds of version 6. This vulnerability has been fixed in <a href=\"https:\/\/www.veeam.com\/kb2683\" target=\"_blank\" rel=\"noopener\">Veeam Agent for Microsoft Windows 6.3.2 (build 6.3.2.1205)<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Users of Veeam Backup &amp; Replication must react. The provider Veeam has released Veeam Backup &amp; Replication 12.3.2 and Veeam Agent for Microsoft Windows 6.3.2 on June 17, 2025. Among other things, Veeam Backup &amp; Replication 12.3.2 closes a critical &hellip; <a href=\"https:\/\/borncity.com\/win\/2025\/06\/17\/veeam-backup-replication-12-3-2-closes-critical-vulnerabilities-cve-2025-23121-etc\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,195,2835],"class_list":["post-38419","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-update","tag-veeam"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/38419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=38419"}],"version-history":[{"count":3,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/38419\/revisions"}],"predecessor-version":[{"id":38422,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/38419\/revisions\/38422"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=38419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=38419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=38419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}