
Veeam has released a security update to address critical security flaws affecting backup and replication software that could lead to remote code execution.
The vulnerability tracked as CVE-2025-23120 has a CVSS score of 9.9 out of 10.0. Affects 12.3.0.310 and all previous version 12 builds.
“The vulnerability allows remote code execution (RCE) by authenticated domain users,” the company said in an advisory released Wednesday.
Watchtowr security researcher Piotr Bazydlo is acknowledged to have discovered and reported defects resolved in version 12.3.1 (build 12.3.1.1139).
According to Bazydlo and researcher Sina Kheirkhah, CVE-2025-23120 stems from the inconsistent handling of Veeam’s deintervention mechanism, causing a class that could be escaped.
This also means that threat actors can leverage blocklists, i.e. veeam.backup.esxmanager.xmlframeworks and veeam.backup.core.backupsummary – to achieve remote code execution.

“These vulnerabilities could be exploited by users who belong to a local user group on the Windows host of a Veeam server,” the researchers said. “Even better – if you combine servers into a domain, these vulnerabilities could be exploited by any domain user.”
The patch introduced by Veeam adds two gadgets to an existing block list. This means that if other viable detrimental backward gadgets are discovered, the solution could once again be vulnerable to similar risks.
This development occurs because IBM has issued a fix to fix two important bugs in the AIX operating system that allows the command to be executed.
The list of drawbacks affecting AIX versions 7.2 and 7.3 is
CVE-2024-56346 (CVSS score: 10.0) – Inappropriate access control vulnerability that allows remote attackers to execute arbitrary commands via AIX Nimsis NIM Master Service CVE-2024-56347 (CVSS score: 9.6) SSL/TLS protection mechanism
Although there is no evidence that any of these serious defects are being exploited in the wild, users are advised to move quickly to apply the necessary patches to combat potential threats.
Source link