Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Critical RCE in Veeam Backup & Replication — Third Domain
Critical RCE in Veeam Backup & Replication — Third Domain

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-21669

Critical RCE in Veeam Backup & Replication — Third Domain

A third concurrent critical RCE vulnerability in Veeam Backup & Replication enables domain-authenticated attackers to execute code on the Backup Server,...

Dylan H.

Security Team

March 13, 2026
6 min read

Affected Products

  • Veeam Backup & Replication (unpatched versions)

Executive Summary

CVE-2026-21669 is the third in a cluster of critical remote code execution vulnerabilities disclosed simultaneously in Veeam Backup & Replication on March 12, 2026. Like CVE-2026-21666 and CVE-2026-21667, it allows any authenticated domain user to execute arbitrary code on the Backup Server with a CVSS score of 9.9.

The simultaneous disclosure of three domain-user-exploitable RCE vulnerabilities in Veeam's flagship backup product — each representing a distinct attack vector — represents one of the most severe enterprise backup security events in recent years. Any organization running Veeam in an Active Directory environment is at immediate risk until patched.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-21669
CVSS Score9.9 (Critical)
TypeRemote Code Execution
Attack VectorNetwork
Privileges RequiredLow (authenticated domain user)
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
Patch AvailableYes — apply Veeam security patch immediately

Affected Products

ProductAffected VersionsRemediation
Veeam Backup & ReplicationAll unpatched versionsApply vendor security patch

Technical Analysis

The Veeam March 2026 RCE Cluster

CVE-2026-21669 is part of a four-CVE disclosure from Veeam's March 2026 security bulletin. Three of the four vulnerabilities (21666, 21667, 21669) are accessible to domain users; the fourth (21671) requires Backup Administrator role and targets HA deployments. The cluster pattern suggests a comprehensive internal or third-party security audit identified multiple authorization enforcement failures across different Veeam service components.

Root Cause

CVE-2026-21669 exploits a third distinct component or code path within the Veeam Backup Server that fails to enforce role-based access controls. When an authenticated domain principal interacts with this component, the system processes the request with Backup Server privileges, enabling arbitrary code execution.

The CVSS 9.9 score (rather than 10.0) suggests some minor scope limitation — but the practical impact in enterprise environments remains equivalent to full backup infrastructure compromise.

Why Multiple Vectors Matter

The presence of three separate CVSS 9.9 domain-user RCE paths means:

  • Blocking one attack path does not protect against the others — all three CVEs must be patched
  • Workarounds are insufficient — network controls can reduce exposure but a motivated attacker with domain access may find alternate paths
  • Defense-in-depth is essential — supplementary controls (credential rotation, repository immutability) are critical

Attack Flow

1. Attacker holds any domain credential — obtained via phishing, password spray, credential reuse
2. Backup Server is reachable (common in enterprise networks; often not restricted at layer 3)
3. Attacker crafts a request targeting the CVE-2026-21669 vulnerable component
4. Veeam service processes the request without adequate privilege check
5. Code executes on the Backup Server under service account context (typically high-privilege)
6. Attacker exfiltrates hypervisor and domain credentials stored in Veeam
7. Full lateral movement across the enterprise using Veeam's stored credentials

Impact Assessment

Impact AreaDescription
RCE on Backup ServerCode execution under Veeam service account — typically Local System or domain admin
Credential HarvestingAll credentials in Veeam configuration database (VeeamBackup SQL) exposed
Backup Data AccessFull read/write to all backup repositories — VMs, file servers, databases
Ransomware FacilitationDestroy backup chains before deploying ransomware to eliminate recovery options
Hypervisor TakeoverVMware vCenter, Hyper-V, Nutanix credentials enable full hypervisor access
Cloud Storage AccessAWS, Azure, GCP credentials stored for cloud backup targets become exposed

Immediate Remediation

Priority 1: Emergency Patch Application

Apply the Veeam March 2026 security patch. This single patch addresses all four CVEs (21666, 21667, 21669, 21671).

# Pre-patch: document current version
$veeamVersion = Get-ItemProperty "HKLM:\SOFTWARE\Veeam\Veeam Backup and Replication" | Select-Object -ExpandProperty CoreVersion
Write-Host "Current Veeam version: $veeamVersion"
 
# Stop Veeam services before applying patch (if required by patch instructions)
# Get-Service Veeam* | Stop-Service -Force
 
# Post-patch: verify new version
$newVersion = Get-ItemProperty "HKLM:\SOFTWARE\Veeam\Veeam Backup and Replication" | Select-Object -ExpandProperty CoreVersion
Write-Host "Patched Veeam version: $newVersion"

Priority 2: Emergency Network Segmentation

# Block all inbound connections to Veeam ports from general domain users
# Only allow from authorised Veeam console hosts and Veeam proxies
 
# Get Veeam proxy IP addresses
Add-PSSnapin VeeamPSSnapIn
$proxyIPs = Get-VBRViProxy | ForEach-Object { [System.Net.Dns]::GetHostAddresses($_.Host.Name) | Select-Object -ExpandProperty IPAddressToString }
Write-Host "Veeam proxy IPs to allow: $($proxyIPs -join ', ')"

Priority 3: Credential Rotation Plan

# List all credentials stored in Veeam for rotation planning
Add-PSSnapin VeeamPSSnapIn
Get-VBRCredentials | Select-Object Name, Description, Type | Format-Table -AutoSize

Detection Indicators

IndicatorDescription
Domain user accounts in Veeam logs outside of change windowsPotential exploitation attempt
PowerShell or cmd.exe spawned by VeeamBackupSvc.exeCode execution indicator
VeeamBackup SQL database accessed by non-Veeam processesCredential exfiltration from config DB
Unexpected backup jobs added or modifiedPost-exploitation persistence
Network connections from Backup Server to external/unusual IPsC2 communication or data staging
Veeam Hardened Repository access from unfamiliar clientsAttempt to access immutable backups

Post-Remediation Checklist

  1. Patch all Veeam Backup Servers with the March 2026 security update (covers all 4 CVEs)
  2. Credential rotation — systematically rotate every credential stored in Veeam:
    • VMware vCenter service accounts
    • Hyper-V host credentials
    • Linux/Windows agent credentials
    • Cloud provider credentials (AWS, Azure, GCP)
    • SQL Server backup accounts
  3. Log review — search Veeam audit logs and Windows Event logs for exploitation indicators
  4. Repository integrity check — verify backup chain integrity; check for unexpected deletions
  5. Enable Hardened Repository immutability if not already configured
  6. Network segmentation — enforce strict firewall rules around Veeam infrastructure
  7. Enable 4-eyes authorization in Veeam for critical operations
  8. Engage IR if exploitation is suspected prior to patch application

References

  • NVD — CVE-2026-21669
  • Veeam Security Advisories Portal
  • Related: CVE-2026-21666 — Veeam Backup Server RCE (Domain User)
  • Related: CVE-2026-21667 — Veeam Backup Server RCE (Domain User)
  • Related: CVE-2026-21671 — Veeam HA Deployment RCE (Backup Admin)
#CVE-2026-21669#Veeam#Backup & Replication#RCE#Remote Code Execution#Domain User#Enterprise Backup

Related Articles

Critical RCE in Veeam Backup & Replication — Authenticated

A critical remote code execution vulnerability in Veeam Backup & Replication allows any authenticated domain user to execute arbitrary code on the Backup...

6 min read

Critical RCE in Veeam Backup & Replication — Authenticated

A second critical remote code execution vulnerability in Veeam Backup & Replication lets any authenticated domain user execute code on the Backup Server,...

6 min read

Critical RCE in Veeam Backup & Replication HA Deployments

A critical RCE vulnerability in Veeam Backup & Replication high-availability deployments allows users with the Backup Administrator role to execute...

7 min read
Back to all Security Alerts