CVE-2023-27532

Published Mar 10, 2023

Last updated 6 months ago

Exploit knownCVSS high 7.5
Veeam Backup & Replication

Overview

AI description

Automated description summarized from trusted sources.

CVE-2023-27532 is a vulnerability in Veeam Backup & Replication that allows an unauthenticated attacker within the backup infrastructure network to obtain encrypted credentials stored in the configuration database. The vulnerability affects the Veeam.Backup.Service.exe process, which by default uses TCP port 9401. Successful exploitation of CVE-2023-27532 can lead to an attacker gaining access to the backup infrastructure hosts. A proof-of-concept (PoC) exploit has been released that allows a remote, unauthenticated threat actor with access to the VBR service to obtain plaintext usernames and passwords, potentially leading to privilege elevation and remote code execution.

Description
Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts.
Source
support@hackerone.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability
Exploit added on
Aug 22, 2023
Exploit action due
Sep 12, 2023
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

support@hackerone.com
CWE-306
nvd@nist.gov
CWE-306

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

20

  1. Ransomware vulns with highest exploit likelihood ⬆️ (past 30d): - CVE-2021-26857 (Exchange On-Pre..) +210.76% - CVE-2022-26500 (Veeam Backup & ..) +24.70% - CVE-2015-2291 (IQVW32.sys (BYO..) +22.80% - CVE-2023-27532 (Veeam Backup & ..) +17.62% - CVE-2021-27876 (Verit

    @DefusedCyber

    22 Sept 2025

    10416 Impressions

    13 Retweets

    89 Likes

    63 Bookmarks

    1 Reply

    1 Quote

  2. New IOC Alert → From SharePoint Vulnerability Exploit to Enterprise Ransomware. ■ Adversary: Warlock ■ Indicator: CVE-2023-27532

    @CTI131

    20 Aug 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Actively exploited CVE : CVE-2023-27532

    @transilienceai

    19 Jun 2025

    67 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  4. Estensioni VSCode e backdoor Betruger RansomHub facilitano i ransomware Sicurezza Informatica, ahban.shiba, backdoor modulare, Betruger, CVE-2023-27532, cybercrime, estensioni malevole, RansomHub, Ransomware, ReversingLabs, supply chain attack, VSCode https://t.co/MJr5n6KdKA http

    @matricedigitale

    21 Mar 2025

    70 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 履歴書を餌としたTA4557/FIN6によるフィッシング事例。The DFIR Report報告。ie4uinit.exeやmsxsl.exe等のLOLBin(現地調達型攻撃に使えるバイナリ)を用いてmore_eggsマルウェアを実行。CVE-2023-27532でVeeamサーバを攻撃。CloudflaredをインストールしRDPをトンネリング。 https://t.co/RPvWeF6Nog

    @__kokumoto

    2 Dec 2024

    405 Impressions

    0 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. #Akira #Ransomware DLS is online again. hxxps://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/ Their favorite vulnerabilities used in different breaches are: CVE-2023-27532, CVE-2024-37085 https://t.co/ep1WtMrFtF

    @ShanHolo

    11 Nov 2024

    541 Impressions

    4 Retweets

    10 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  7. #Vulnerability #CVE202327532 Ransomware Groups Exploit Veeam Flaw CVE-2023-27532 in Nigerian Cyber Infrastructure https://t.co/f8ktLVN2bs

    @Komodosec

    27 Oct 2024

    41 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    1 Quote

Configurations

References

Sources include official advisories and independent security research.