Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Critical RCE in Veeam Backup & Replication — Authenticated
Critical RCE in Veeam Backup & Replication — Authenticated

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-21666

Critical RCE in Veeam Backup & Replication — Authenticated

A critical remote code execution vulnerability in Veeam Backup & Replication allows any authenticated domain user to execute arbitrary code on the Backup...

Dylan H.

Security Team

March 13, 2026
6 min read

Affected Products

  • Veeam Backup & Replication (unpatched versions)

Executive Summary

A critical remote code execution vulnerability (CVE-2026-21666) has been disclosed in Veeam Backup & Replication, one of the most widely deployed enterprise backup solutions in the world. The flaw enables any authenticated domain user — without requiring Veeam-specific administrative privileges — to execute arbitrary code on the Backup Server.

CVSS Score: 9.9 (Critical)

This vulnerability requires no special Veeam role. Any domain account with network access to the Veeam Backup Server is sufficient to trigger the exploit. Given that Veeam infrastructure is commonly integrated with Active Directory across enterprise environments, the attack surface is extremely broad. Organizations running Veeam should treat this as an urgent, priority-zero remediation item.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-21666
CVSS Score9.9 (Critical)
TypeRemote Code Execution
Attack VectorNetwork
Privileges RequiredLow (authenticated domain user)
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
Patch AvailableYes — apply Veeam security patch immediately

Affected Products

ProductAffected VersionsRemediation
Veeam Backup & ReplicationAll unpatched versionsApply vendor security patch

Technical Analysis

Root Cause

CVE-2026-21666 stems from insufficient authorization enforcement within a Veeam Backup Server service or API endpoint. An authenticated domain user — the minimal authentication level granted to any user in an Active Directory domain — can send a crafted request or payload to the affected component and trigger server-side code execution.

The lack of a privilege check between domain authentication and the execution pathway means the control plane of the backup infrastructure can be compromised without any Veeam-specific credentials or role assignments.

Attack Flow

1. Attacker obtains any valid domain user credential (low bar — phishing, credential reuse, etc.)
2. Attacker identifies a Veeam Backup Server on the network (common in enterprise environments)
3. Attacker sends a crafted request to the vulnerable Veeam service/endpoint
4. The Veeam service processes the request without validating the user's authorization level
5. Arbitrary code executes on the Backup Server under the service account context
6. Attacker achieves full control of backup infrastructure
7. Lateral movement to all backup repositories, connected storage, and managed VMs

Why This Is Dangerous

Veeam Backup & Replication servers have privileged access to virtually every system in an enterprise environment:

  • Hypervisor credentials (VMware vCenter, Hyper-V, Nutanix) stored for backup jobs
  • Backup repositories containing full VM images and file-level backups of all systems
  • Tape libraries and cloud storage (AWS S3, Azure Blob, Google Cloud Storage)
  • Service account credentials used to access source systems during backup
  • Domain credentials for AD-integrated authentication

A compromise of the Backup Server effectively hands an attacker full read/write access to every system backed up by Veeam — including domain controllers, database servers, and sensitive file servers.


Impact Assessment

Impact AreaDescription
Remote Code ExecutionFull code execution on the Backup Server under service account context
Credential TheftAccess to all stored credentials — hypervisor, AD, cloud, database
Data ExfiltrationAll backup repositories are accessible — complete data exposure
Ransomware EnablementAttackers can encrypt or delete backup repositories, eliminating recovery options
Lateral MovementPivot to every managed system using stored credentials
PersistenceModify backup jobs, install backdoors, tamper with recovery points

Immediate Remediation

Step 1: Apply the Veeam Security Patch

Obtain and apply the latest Veeam Backup & Replication security patch from the Veeam customer portal immediately.

# Check current Veeam Backup & Replication version via PowerShell
Get-WmiObject -Class Win32_Product | Where-Object { $_.Name -like "*Veeam Backup*" } | Select-Object Name, Version
 
# Or via registry
Get-ItemProperty "HKLM:\SOFTWARE\Veeam\Veeam Backup and Replication" | Select-Object CoreVersion

Step 2: Restrict Network Access to Veeam Services

Until the patch is applied, restrict access to Veeam Backup Server ports at the network level:

# Block inbound access to Veeam default ports from non-Veeam admin hosts
# Veeam uses ports 9392, 9393, 9394, 9395, 9396, 9397, 9398, 9399, 9401
# Apply firewall rules to limit access to authorised admin workstations only
 
New-NetFirewallRule -DisplayName "Block Veeam Ports - Non-Admin" `
  -Direction Inbound -Protocol TCP `
  -LocalPort 9392-9401 `
  -Action Block `
  -Profile Any

Step 3: Audit Domain User Access to Veeam

# Review who has network access to the Veeam Backup Server
# Check Veeam role assignments
Add-PSSnapin VeeamPSSnapIn
Get-VBRServerSession
Get-VBRRole | Select-Object Name, Users

Step 4: Review Veeam Service Account Privileges

# Audit the service account running VeeamBackupSvc
Get-WmiObject Win32_Service | Where-Object { $_.Name -like "*Veeam*" } | Select-Object Name, StartName, State

Detection Indicators

IndicatorDescription
Unexpected processes spawned by VeeamBackupSvcCode execution via the Backup Server service
Unusual outbound network connections from the Backup ServerPotential reverse shell or data exfiltration
New scheduled backup jobs created by non-admin accountsPost-exploitation persistence
Access to backup repositories from unfamiliar hostsUnauthorized data access
Veeam audit log entries from unexpected domain user accountsAuthentication anomaly

Post-Remediation Checklist

  1. Patch all Veeam Backup & Replication instances immediately
  2. Rotate all credentials stored in Veeam — hypervisor, cloud, database, AD service accounts
  3. Audit Veeam access logs for signs of exploitation before the patch was applied
  4. Review backup repository access controls — ensure immutability features are enabled
  5. Enable Veeam audit logging if not already active
  6. Network-segment the Veeam Backup Server — only authorised admin hosts should reach Veeam ports
  7. Enable 4-eyes authorization for critical Veeam operations
  8. Notify security operations if exploitation is suspected — incident response may be required

References

  • NVD — CVE-2026-21666
  • Veeam Security Advisories Portal
  • Related: CVE-2026-21667 — Veeam Backup Server RCE (Domain User)
  • Related: CVE-2026-21669 — Veeam Backup Server RCE (Domain User)
  • Related: CVE-2026-21671 — Veeam HA Deployment RCE (Backup Admin)
#CVE-2026-21666#Veeam#Backup & Replication#RCE#Remote Code Execution#Domain User#Enterprise Backup

Related Articles

Critical RCE in Veeam Backup & Replication — Authenticated

A second critical remote code execution vulnerability in Veeam Backup & Replication lets any authenticated domain user execute code on the Backup Server,...

6 min read

Critical RCE in Veeam Backup & Replication — Third Domain

A third concurrent critical RCE vulnerability in Veeam Backup & Replication enables domain-authenticated attackers to execute code on the Backup Server,...

6 min read

Critical RCE in Veeam Backup & Replication HA Deployments

A critical RCE vulnerability in Veeam Backup & Replication high-availability deployments allows users with the Backup Administrator role to execute...

7 min read
Back to all Security Alerts