CVE-2022-26500

Veeam Backup & Replication — Veeam Backup & Replication Remote Code Execution Vulnerability
⚠️ CVSS 3.1  8.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

The Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code.

https://www.veeam.com/kb4288; https://nvd.nist.gov/vuln/detail/CVE-2022-26500

Key Details

PropertyValue
CVE ID CVE-2022-26500
Vendor / Product Veeam — Backup & Replication
NVD Published2022-03-17
NVD Last Modified2025-11-03
CVSS 3.1 Score8.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
SeverityHIGH
CWE CWE-22
CISA KEV Added2022-12-13
CISA KEV Deadline2023-01-03
Known Ransomware Use ⚠️ Yes

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2023-01-03. Apply updates per vendor instructions.

Timeline

DateEvent
2022-12-13Added to CISA Known Exploited Vulnerabilities catalog
2023-01-03CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2022-26500 Vulnerability Database
CISA KEV Catalog Entry US Government