CVE-2022-26500
Published Mar 17, 2022
Last updated 6 months ago
AI description
CVE-2022-26500 is a vulnerability that exists in Veeam Backup & Replication versions 9.5U3, 9.5U4, 10.x, and 11.x. It stems from an improper limitation of path names, which allows remote authenticated users to access internal API functions. This vulnerability could allow attackers to upload and execute arbitrary code on the target system. The Veeam Distribution Service (TCP 9380 by default) allows unauthenticated users to access internal API functions. A remote attacker may send input to the internal API which may lead to uploading and executing of malicious code.
- Description
- Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Data from CISA
- Vulnerability name
- Veeam Backup & Replication Remote Code Execution Vulnerability
- Exploit added on
- Dec 13, 2022
- Exploit action due
- Jan 3, 2023
- Required action
- Apply updates per vendor instructions.
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
20
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "837D781D-E21B-458C-8D4A-59949CE4D580",
"versionEndExcluding": "10.0.1.4854",
"versionStartIncluding": "10.0.0.4442"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FD0C1BCB-A018-4425-AC3D-0CE6EAEF372F",
"versionEndExcluding": "11.0.1.1261",
"versionStartIncluding": "11.0.0.825"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:9.5.0.1536:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3BC7D0C1-0A10-4704-B8A0-ADFB8B2BA1BB"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:9.5.4.2615:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1D5BA0C4-F689-4B0E-BBB5-051DEDF40721"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:10.0.1.4854:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "12E8F01F-4E41-46F0-94BC-DD5174DDF393"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:10.0.1.4854:p20201202:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E0417823-7418-4294-BE57-0304772DFE39"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:10.0.1.4854:p20210609:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "06BE9B78-075C-48E6-817A-5E0A89983EBC"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:11.0.1.1261:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EC28D606-0A9B-46E5-A88C-8041357979DB"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:11.0.1.1261:p20211123:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8158D6BC-2041-4600-B935-AD928621D987"
},
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:11.0.1.1261:p20211211:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "54A5147A-341A-4790-AAA8-DF2648423C50"
}
],
"operator": "OR"
}
]
}
]