Veeam has patched a critical remote code execution vulnerability tracked as CVE-2025-23120 in its Backup & Replication software that impacts domain-joined installations. Ransomware gangs have told BleepingComputer in the past that Veeam Backup & Replication servers are always targets, as it allows them an easy way to steal data and block restoration efforts by deleting backups. According to a technical writeup by watchTowr Labs, who discovered the bug, CVE-2025-23120 is a deserialization vulnerability in the Veeam.Backup.EsxManager.xmlFrameworkDs and Veeam.Backup.Core.BackupSummary .NET classes. The good news is that the flaw only impacts Veeam Backup & Replication installations that are joined to a domain. The flaw was disclosed yesterday and affects Veeam Backup & Replication version 12.3.0.310 and all earlier version 12 builds. Those companies using Veeam Backup & Replication should make it a priority to upgrade to 12.3.1 as soon as possible. "Anyway, you've probably guessed where this is going today - it seems Veeam, despite being a ransomware gang's favourite play toy - didn't learn after the lesson given by Frycos in previous research published. Unfortunately, many companies have joined their Veeam server to a Windows domain, ignoring the company's long-standing best practices. A deserialization flaw is when an application improperly processes serialized data, allowing attackers to inject malicious objects, or gadgets, that can execute harmful code. Furthermore, given ransomware gangs' interest in this application, it is strongly advised to review Veeam's best practices and disconnect the server from your domain. To fix the flaw, Veeam introduced a blacklist of known classes or objects that could be exploited. This flaw would make Veeam installs even more valuable due to the ease with which threat actors can breach the servers. While there are no reports of this flaw being exploited in the wild, watchTowr has shared enough technical details that it would not be surprising to see a proof-of-concept (PoC) released soon.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 20 Mar 2025 23:35:07 +0000