First published: Thu Mar 17 2022(Updated: )
Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Veeam | ||
Veeam Backup & Replication | >=10.0.0.4442<10.0.1.4854 | |
Veeam Backup & Replication | >=11.0.0.825<11.0.1.1261 | |
Veeam Backup & Replication | =9.5.0.1536 | |
Veeam Backup & Replication | =9.5.4.2615 | |
Veeam Backup & Replication | =10.0.1.4854 | |
Veeam Backup & Replication | =10.0.1.4854-p20201202 | |
Veeam Backup & Replication | =10.0.1.4854-p20210609 | |
Veeam Backup & Replication | =11.0.1.1261 | |
Veeam Backup & Replication | =11.0.1.1261-p20211123 | |
Veeam Backup & Replication | =11.0.1.1261-p20211211 | |
Veeam Backup & Replication | >=10.0.0.4442<10.0.1.4854 | |
Veeam Backup & Replication | >=11.0.0.825<11.0.1.1261 | |
Veeam Backup & Replication | =9.5.0.1536 | |
Veeam Backup & Replication | =9.5.4.2615 | |
Veeam Backup & Replication | =10.0.1.4854 | |
Veeam Backup & Replication | =10.0.1.4854-p20201202 | |
Veeam Backup & Replication | =10.0.1.4854-p20210609 | |
Veeam Backup & Replication | =11.0.1.1261 | |
Veeam Backup & Replication | =11.0.1.1261-p20211123 | |
Veeam Backup & Replication | =11.0.1.1261-p20211211 | |
>=10.0.0.4442<10.0.1.4854 | ||
>=11.0.0.825<11.0.1.1261 | ||
=9.5.0.1536 | ||
=9.5.4.2615 | ||
=10.0.1.4854 | ||
=10.0.1.4854-p20201202 | ||
=10.0.1.4854-p20210609 | ||
=11.0.1.1261 | ||
=11.0.1.1261-p20211123 | ||
=11.0.1.1261-p20211211 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26500 is a vulnerability in Veeam Backup & Replication that allows unauthenticated users to access internal API functions, leading to potential remote code execution.
CVE-2022-26500 affects Veeam Backup & Replication versions 9.5.0.1536, 9.5.4.2615, 10.0.0.4442 to 10.0.1.4854, and 11.0.0.825 to 11.0.1.1261.
CVE-2022-26500 has a severity rating of 8.8 (high).
An attacker can exploit CVE-2022-26500 by sending input to the internal API of Veeam Backup & Replication, potentially allowing them to upload and execute malicious code.
To protect your system from CVE-2022-26500, it is recommended to update Veeam Backup & Replication to the latest version available and follow any security recommendations provided by the vendor.