Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Critical RCE in Veeam Backup & Replication — Authenticated
Critical RCE in Veeam Backup & Replication — Authenticated

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-21667

Critical RCE in Veeam Backup & Replication — Authenticated

A second critical remote code execution vulnerability in Veeam Backup & Replication lets any authenticated domain user execute code on the Backup Server,...

Dylan H.

Security Team

March 13, 2026
6 min read

Affected Products

  • Veeam Backup & Replication (unpatched versions)

Executive Summary

CVE-2026-21667 is a second critical remote code execution vulnerability disclosed simultaneously with CVE-2026-21666 in Veeam Backup & Replication. Like its companion CVE, it allows any authenticated domain user to achieve code execution on the Backup Server — no Veeam-specific privileges required.

CVSS Score: 9.9 (Critical)

The concurrent disclosure of multiple domain-user-accessible RCE vulnerabilities in the same product indicates a systemic authorization enforcement failure within Veeam's service layer. Organizations must prioritize patching as these flaws collectively provide multiple pathways for any domain-authenticated attacker to fully compromise Veeam infrastructure.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-21667
CVSS Score9.9 (Critical)
TypeRemote Code Execution
Attack VectorNetwork
Privileges RequiredLow (authenticated domain user)
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
Patch AvailableYes — apply Veeam security patch immediately

Affected Products

ProductAffected VersionsRemediation
Veeam Backup & ReplicationAll unpatched versionsApply vendor security patch

Technical Analysis

Context: Multiple Simultaneous CVEs

CVE-2026-21667 was published on the same day as CVE-2026-21666 and CVE-2026-21669, all sharing the same description: an authenticated domain user can perform RCE on the Backup Server. The concurrent release of three CVSS 9.9 vulnerabilities in a single product strongly suggests:

  • Multiple distinct code paths within Veeam's service layer all fail to enforce proper authorization
  • The vulnerabilities were likely identified through a coordinated security audit or penetration test
  • Patching a single attack vector does not remediate exposure — all three CVEs must be addressed together

Root Cause

CVE-2026-21667 represents a separate attack surface within Veeam's Backup Server — likely a different API endpoint, RPC method, or service component — that similarly fails to validate whether the authenticated caller holds the required Veeam role before processing privileged operations.

The effective privilege requirement of "domain user" (the lowest possible Active Directory credential tier) maximizes the attack surface across any enterprise with Active Directory integration.

Attack Flow

1. Attacker obtains any valid domain credential (phishing, credential stuffing, insider threat)
2. Attacker enumerates Veeam Backup Servers on the internal network
3. Attacker targets a different endpoint/service component than CVE-2026-21666
4. Crafted payload bypasses authorization and triggers RCE on the Backup Server
5. Attacker achieves code execution under VeeamBackupSvc or related service account
6. Full compromise of backup infrastructure — repositories, credentials, managed systems

Relationship to Other Veeam CVEs (March 2026)

CVECVSSPrivilege RequiredAttack Surface
CVE-2026-216669.9Domain UserBackup Server
CVE-2026-216679.9Domain UserBackup Server
CVE-2026-216699.9Domain UserBackup Server
CVE-2026-216719.1Backup AdministratorBackup Server (HA)

Impact Assessment

Impact AreaDescription
Remote Code ExecutionArbitrary code execution on the Backup Server
Credential ExposureAll credentials stored in Veeam configuration database exposed
Backup TamperingAttackers can corrupt, delete, or encrypt backup data
Ransomware StagingElimination of backup recovery options before deploying ransomware
Lateral MovementHypervisor credentials enable pivot to every backed-up workload

Immediate Remediation

Step 1: Apply Veeam Security Patch

Apply the Veeam security patch released to address the March 2026 CVEs. All four CVEs (21666, 21667, 21669, 21671) are addressed in the same patch release.

# Verify current version before patching
Get-ItemProperty "HKLM:\SOFTWARE\Veeam\Veeam Backup and Replication" | Select-Object CoreVersion
 
# After patching, confirm version reflects the patch level
Get-ItemProperty "HKLM:\SOFTWARE\Veeam\Veeam Backup and Replication" | Select-Object CoreVersion

Step 2: Isolate Veeam Backup Server

# Create a Windows Firewall rule to restrict Veeam port access
# Only allow connections from Veeam admin consoles and proxies
$AdminHosts = @("10.0.0.10", "10.0.0.11")  # Replace with your admin host IPs
 
New-NetFirewallRule -DisplayName "Allow Veeam Admin Hosts Only" `
  -Direction Inbound -Protocol TCP `
  -LocalPort 9392-9401 `
  -RemoteAddress $AdminHosts `
  -Action Allow `
  -Profile Any
 
New-NetFirewallRule -DisplayName "Block Veeam Ports Default" `
  -Direction Inbound -Protocol TCP `
  -LocalPort 9392-9401 `
  -Action Block `
  -Profile Any

Step 3: Monitor for Active Exploitation

# Check for unexpected child processes of Veeam services
Get-WmiObject Win32_Process | Where-Object {
  $_.ParentProcessId -in (Get-Process | Where-Object { $_.Name -like "Veeam*" }).Id
} | Select-Object Name, ProcessId, CommandLine
 
# Review Windows Event Log for suspicious logins to Veeam
Get-WinEvent -LogName "Application" -FilterHashtable @{ProviderName="Veeam Backup"} |
  Where-Object { $_.LevelDisplayName -eq "Error" -or $_.LevelDisplayName -eq "Warning" } |
  Select-Object -First 50 TimeCreated, Message

Detection Indicators

IndicatorDescription
Unexpected child processes under VeeamBackupSvc.exeCode execution via the exploit
Outbound TCP connections from Backup Server to external IPsPotential C2 or data exfiltration
Veeam job configuration changes outside change windowsTampering post-exploitation
Access to VeeamBackup SQL database from non-Veeam processesCredential harvest from config DB
Domain user accounts appearing in Veeam audit logs unexpectedlyExploitation indicator

Post-Remediation Checklist

  1. Patch — apply the Veeam March 2026 security patch across all Veeam Backup Servers
  2. Credential rotation — rotate all credentials stored in Veeam (hypervisor, cloud, AD)
  3. Log review — audit Veeam and Windows Event logs for exploitation evidence
  4. Repository hardening — enable immutability on backup repositories (Hardened Repository)
  5. Network segmentation — enforce firewall rules restricting Veeam port access
  6. 4-eyes authorization — enable for critical Veeam operations
  7. Incident response — engage IR if exploitation before patch application is suspected

References

  • NVD — CVE-2026-21667
  • Veeam Security Advisories Portal
  • Related: CVE-2026-21666 — Veeam Backup Server RCE (Domain User)
  • Related: CVE-2026-21669 — Veeam Backup Server RCE (Domain User)
  • Related: CVE-2026-21671 — Veeam HA Deployment RCE (Backup Admin)
#CVE-2026-21667#Veeam#Backup & Replication#RCE#Remote Code Execution#Domain User#Enterprise Backup

Related Articles

Critical RCE in Veeam Backup & Replication — Authenticated

A critical remote code execution vulnerability in Veeam Backup & Replication allows any authenticated domain user to execute arbitrary code on the Backup...

6 min read

Critical RCE in Veeam Backup & Replication — Third Domain

A third concurrent critical RCE vulnerability in Veeam Backup & Replication enables domain-authenticated attackers to execute code on the Backup Server,...

6 min read

Critical RCE in Veeam Backup & Replication HA Deployments

A critical RCE vulnerability in Veeam Backup & Replication high-availability deployments allows users with the Backup Administrator role to execute...

7 min read
Back to all Security Alerts