CVE-2022-26500

Published Mar 17, 2022

Last updated 6 months ago

Exploit knownCVSS high 8.8
Veeam Backup & Replication

Overview

AI description

Automated description summarized from trusted sources.

CVE-2022-26500 is a vulnerability that exists in Veeam Backup & Replication versions 9.5U3, 9.5U4, 10.x, and 11.x. It stems from an improper limitation of path names, which allows remote authenticated users to access internal API functions. This vulnerability could allow attackers to upload and execute arbitrary code on the target system. The Veeam Distribution Service (TCP 9380 by default) allows unauthenticated users to access internal API functions. A remote attacker may send input to the internal API which may lead to uploading and executing of malicious code.

Description
Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.
Source
cve@mitre.org
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
6.5
Impact score
6.4
Exploitability score
8
Vector string
AV:N/AC:L/Au:S/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
Veeam Backup & Replication Remote Code Execution Vulnerability
Exploit added on
Dec 13, 2022
Exploit action due
Jan 3, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-22
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-22

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

20

Configurations