Latest Veeam Updates
Like all software providers, Veeam sends out regular updates and patches. Occasionally there may be critical updates and they will have specific instructions attached. If you are looking for information on the latest Veeam updates, critical or not, this is a good place to start.
The most recent information will be at the top of the page below. Bookmark this page for easy reference in the future!
Veeam Critical Updates: CVE-2022-26500, CVE-2022-26501
On March 12, 2022, Veeam® Software released a statement and patches related to CVE-2022-26500 and CVE-2022-26501, which referenced a remote code execution (RCE) vulnerability in all versions of Veeam Backup & Replication. This issue has a CVSS score of 9.8 and is a critical severity.
Global Data Vault recommends all customers apply the patch for your current version, i.e., if you are on v10, apply the v10a cumulative patch. Customers still using v9.5u4 must upgrade to v10. Please contact GDV if you have any questions.
From Veeam:
Cause:
The Veeam Distribution Service (TCP 9380 by default) allows unauthenticated users to access internal API functions. A remote attacker may send input to the internal API which may lead to uploading and executing of malicious code.
Solution:
Patches are available for the following Veeam Backup & Replication versions:
Notes:
- The patch must be installed on the Veeam Backup & Replication server. Managed servers with Veeam Distribution Service will be updated automatically after installing the patch.
- All new deployments of Veeam Backup & Replication version 11a and 10a installed using the ISO images dated 20220302 or later are not vulnerable.
- If you are using Veeam Backup & Replication 9.5, please upgrade to a supported product version.
Temporary mitigation of the vulnerabilities: Stop and disable the Veeam Distribution Service. The Veeam Distribution Service is installed on the Veeam Backup & Replication server and servers specified as distribution servers in Protection Groups.