Security bulletin with exclamation point symbol in the middle of the screen
Security bulletin with exclamation point symbol in the middle of the screen

Multiple Authenticated High and Critical Vulnerabilities in Veeam Backup & Replication

On March 12, 2026, Veeam released fixes for multiple high and critical severity vulnerabilities in their Backup & Replication product that could allow remote code execution (RCE), privilege escalation, and credential theft.
Security bulletin with exclamation point symbol in the middle of the screen
6 min read

On March 12, 2026, Veeam released fixes for multiple high and critical severity vulnerabilities in their Backup & Replication product that could allow remote code execution (RCE), privilege escalation, and credential theft.

Vulnerability CVSS Description
CVE-2026-21669 Critical (9.9) Allows an authenticated threat actor with domain user access to perform RCE on the Backup Server.
CVE-2026-21670 High (7.7) Allows privileged threat actors to extract saved SSH credentials.
CVE-2026-21671 Critical (9.1) Allows an authenticated threat actor with the Backup Administrator role to perform RCE in high availability (HA) deployments.
CVE-2026-21672 High (8.8) Allows local privilege escalation on Windows-based Veeam Backup and Replication servers.
CVE-2026-21708 Critical (9.9) Allows a threat actor with the Backup Viewer role to perform RCE as a postgres user.

 

Arctic Wolf has not identified publicly available proof-of-concept exploits for these vulnerabilities, nor have we observed any exploitation. Veeam Backup & Replication has historically been a frequent target for ransomware groups due to its critical role in backup and recovery. In ransomware cases involving Akira and Fog ransomware, for example, threat actors have been known to extract sensitive information from Veeam Backup & Replication deployments.

Recommendation

Upgrade to Latest Fixed Build

Arctic Wolf strongly recommends that customers upgrade to the latest fixed build.

Product Affected Version Fixed Version
Veeam Backup & Replication 13.0.1.1071 and all earlier version 13 builds 13.0.1.2067 and later builds

 

Please follow your organization’s patching and testing guidelines to minimize potential operational impact.

References

Share this post: