CVE-2022-26501

Veeam Backup & Replication — Veeam Backup & Replication Remote Code Execution Vulnerability
🔥 CVSS 3.1  9.8 / 10 — CRITICAL 🔴 CISA Known Exploited Vulnerability

Overview

The Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code.

https://www.veeam.com/kb4288; https://nvd.nist.gov/vuln/detail/CVE-2022-26501

Key Details

PropertyValue
CVE ID CVE-2022-26501
Vendor / Product Veeam — Backup & Replication
NVD Published2022-03-17
NVD Last Modified2025-11-03
CVSS 3.1 Score9.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SeverityCRITICAL
CWE CWE-306
CISA KEV Added2022-12-13
CISA KEV Deadline2023-01-03
Known Ransomware Use ⚠️ Yes

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2023-01-03. Apply updates per vendor instructions.

Timeline

DateEvent
2022-12-13Added to CISA Known Exploited Vulnerabilities catalog
2023-01-03CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2022-26501 Vulnerability Database
CISA KEV Catalog Entry US Government