CVE-2025-48983
Published Oct 31, 2025
Last updated a month ago
AI description
CVE-2025-48983 is a vulnerability in the Mount service of Veeam Backup & Replication that allows for remote code execution (RCE) on the Backup infrastructure hosts by an authenticated domain user. This vulnerability affects domain-joined Veeam Backup & Replication v12 backup infrastructure servers. It impacts all version 12 builds up to 12.3.2.3617. The vulnerability can be exploited by an authenticated domain user to execute arbitrary code remotely. The issue was reported by CODE WHITE. The vulnerability has been resolved in the latest build Veeam Backup & Replication 12.3.2.4165 Patch. The Veeam Software Appliance and the upcoming Backup & Replication v13 are architecturally not impacted by this vulnerability.
- Description
- A vulnerability in the Mount service of Veeam Backup & Replication, which allows for remote code execution (RCE) on the Backup infrastructure hosts by an authenticated domain user.
- Source
- support@hackerone.com
- NVD status
- Analyzed
- Products
- veeam_backup_\&_replication
CVSS 3.1
- Type
- Secondary
- Base score
- 9.9
- Impact score
- 6
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
CVE-2025-48983 A vulnerability in the Mount service of Veeam Backup & Replication, which allows for remote code execution (RCE) on the Backup infrastructure hosts by an authenticate… https://t.co/bvJBJRisHU
@CVEnew
31 Oct 2025
312 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Critical RCE in Veeam Backup & Replication (CVE-2025-48983) Unauthenticated attackers can exploit this for remote code execution. Prioritize patching. For more details, read ZeroPath's blog on this vuln. #AppSec #CyberSecurity #Veeam https://t.co/khite4sd4A
@ZeroPathLabs
31 Oct 2025
75 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-48983: CRITICAL] A vulnerability in the Mount service of Veeam Backup & Replication, which allows for remote code execution (RCE) on the Backup infrastructure hosts by an authenticated domain user.#cve,CVE-2025-48983,#cybersecurity https://t.co/vKUjAVehNt https://t.
@CveFindCom
31 Oct 2025
81 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
**CVE-2025-48983** pertains to a critical security flaw within the **Mount service** of **Veeam Backup & Replication**. This vulnerability enables an **authenticated domain user** to execute arbitrary code **remotely** on the Backup infrastructure hosts. The key characteristi
@CveTodo
31 Oct 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CRITICAL: Veeam Backup & Replication 12.3.2 hit by CVE-2025-48983 (CVSS 10) — remote code execution risk for backup hosts! Patch ASAP, restrict permissions, monitor closely. Europe’s enterprises at risk. https://t.co/k8bP31mD4x... https://t.co/Fm3VyJQWO2
@offseq
31 Oct 2025
49 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
⚠️Vulnerabilidades en productos Veeam ❗CVE-2025-48983 ❗CVE-2025-48984 ❗CVE-2025-48982 ➡️Más info: https://t.co/iJ4ewatRET https://t.co/ueJGm0gZKl
@CERTpy
20 Oct 2025
146 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Veeam Backup & Replicationに2つの高リスク脆弱性(CVE-2025-48983,CVE-2025-48984)|セキュリティニュースのセキュリティ対策Lab https://t.co/22byFPJij1
@Luke06121
18 Oct 2025
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️Vulnerabilidades en productos Veeam ❗CVE-2025-48983 ❗CVE-2025-48984 ❗CVE-2025-48982 ➡️Más info: https://t.co/vUAnOm4ybD https://t.co/CoGqKyrGXG
@CERTpy
17 Oct 2025
115 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Veeam Backup & Replicationに2つの高リスク脆弱性(CVE-2025-48983,CVE-2025-48984) https://t.co/9McDh2uLIE #セキュリティ対策Lab #セキュリティ #Security
@securityLab_jp
17 Oct 2025
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨:CVE-2025-48983 & CVE-2025-48984 ( Both CVSS 9.9):Critical RCE Flaws Found in Veeam Backup & Replication 📊1.7K Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/3xYBavXjHI 👇Query HUNTER : https://t.co/q9rtuGfZuz="Vee
@HunterMapping
16 Oct 2025
2110 Impressions
7 Retweets
32 Likes
14 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨:CVE-2025-48983 & CVE-2025-48984 (CVSS 9.9):Critical RCE Flaws Found in Veeam Backup & Replication 📊1.7K Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/3xYBavXjHI 👇Query HUNTER : https://t.co/q9rtuGfZuz="Veeam Bac
@HunterMapping
16 Oct 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Falha crítica no Veeam Backup & Replication 12 expõe servidores a ataques remotos! Hackers podem executar código malicioso nos servidores de backup com acesso autenticado de domínio é como abrir a porta da sala do cofre e convidar o invasor para entrar. 🔥 CVE-2
@TechStartXYZ
15 Oct 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Upozorňujeme na zranitelnosti ve Veeam Backup & Replication, CVE-2025-48983 a CVE-2025-48984. CVE-2025-48983 - Vzdálené spuštění kódu v Mount Service: Zranitelnost umožňuje autentizovanému doménovému uživateli zneužít Mount Service ve Veeam Backup & Re
@GOVCERT_CZ
15 Oct 2025
34 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️⚠️ CVE-2025-48983 & CVE-2025-48984 (CVSS 9.9): Critical RCE Flaws Found in Veeam Backup & Replication 🎯1k+ Results are found on the https://t.co/pb16tGYaKe nearly year. 🔗FOFA Link: https://t.co/wNNUU0Sro7 FOFA Query:app="Veeam-Backup-Ent-Manager" 🔖Refer
@fofabot
15 Oct 2025
1922 Impressions
7 Retweets
23 Likes
5 Bookmarks
0 Replies
0 Quotes
🚨🚨Critical RCE Vulnerabilities in Veeam Backup & Replication CVE-2025-48983 (CVSS 9.9): Authenticated domain users can RCE backup infrastructure hosts. CVE-2025-48984 (CVSS 9.9): Authenticated domain users can RCE the Backup Server. ZoomEye Dork👉app="Veeam Backup En
@zoomeye_team
15 Oct 2025
36590 Impressions
60 Retweets
188 Likes
89 Bookmarks
3 Replies
6 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ABA6D012-0B73-4D37-B42E-1BAE5E4A4221",
"versionEndExcluding": "12.3.2.4165",
"versionStartIncluding": "12.0.0.1402"
}
],
"operator": "OR"
}
]
}
]