Date Posted: 2026/03/19
[Vulnerability Alert] Multiple Critical Security Vulnerabilities Found in Veeam Backup Software
- Subject Explanation: [Vulnerability Alert] Multiple Critical Security Vulnerabilities Found in Veeam Backup Software
- Content Description:
- Forwarding Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) Security Alert TWCERTCC-200-202603-00000015
- Veeam Backup and Replication is Veeam's core backup software. Recently, Veeam released a critical security vulnerability advisory.
- [CVE-2026-21666, CVSS: 9.9] Allows authenticated domain users to remotely execute code on the backup server.
- [CVE-2026-21667, CVSS: 9.9] Allows authenticated domain users to remotely execute code on the backup server.
- [CVE-2026-21668, CVSS: 8.8] Allows authenticated domain users to bypass restrictions and manipulate arbitrary files in the backup repository.
- [CVE-2026-21672, CVSS: 8.8] A local privilege escalation vulnerability exists in Windows-based Veeam Backup and Replication servers.
- [CVE-2026-21708, CVSS: 9.9] Allows backup viewers to remotely execute code as users.
- [CVE-2026-21669, CVSS: 9.9] Allows authenticated domain users to remotely execute code on the backup server.
- [CVE-2026-21671, CVSS: 9.1] Allows authenticated users with the backup administrator role to remotely execute code in High Availability (HA) deployments of Veeam Backup and Replication.
- Impacted Platforms:
- Veeam Backup and Replication versions 12.3.2.4165 and earlier
- Veeam Backup and Replication versions 13.0.1.1071 and earlier
- Suggested Measures:
- Please update to the following versions: Veeam Backup and Replication version 12.3.2.4465, Veeam Backup and Replication version 13.0.1.2067
- References:
Computer and Communication Center
Network Systems Division