First published: Thu Mar 17 2022(Updated: )
Deserialization of untrusted data in Veeam Agent for Windows 2.0, 2.1, 2.2, 3.0.2, 4.x, and 5.x allows local users to run arbitrary code with local system privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Veeam Veeam | >=4.0.0<4.0.2.2208 | |
Veeam Veeam | >=5.0.0<5.0.3.4708 | |
Veeam Veeam | =2.0 | |
Veeam Veeam | =2.1 | |
Veeam Veeam | =2.2 | |
Veeam Veeam | =3.0.2 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26503 is a vulnerability that allows local users to run arbitrary code with local system privileges in Veeam Agent for Windows 2.0, 2.1, 2.2, 3.0.2, 4.x, and 5.x.
Veeam Agent for Windows versions 2.0, 2.1, 2.2, 3.0.2, 4.x, and 5.x are affected by CVE-2022-26503.
CVE-2022-26503 has a severity level of 7.8 (High).
CVE-2022-26503 can be exploited by local users who have access to the affected Veeam Agent for Windows software, allowing them to run arbitrary code with local system privileges.
Yes, you can find references for CVE-2022-26503 on the Veeam website (https://veeam.com) and in their knowledge base article (https://www.veeam.com/kb4289).