NCSC-2026-0096

Vulnerability from csaf_ncscnl - Published: 2026-03-12 14:54 - Updated: 2026-03-12 14:54
Summary
Kwetsbaarheden verholpen in Veeam Backup & Replication

Notes

The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions: NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein. NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory. This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Veeam heeft kwetsbaarheden verholpen in Veeam Backup & Replication.
Interpretaties
De kwetsbaarheden stellen een geauthenticeerde domeingebruiker in staat om op afstand code uit te voeren op de backupserver, wat kan leiden tot ongeautoriseerde controle over backupoperaties. Dit probleem is aanwezig in de backupserveromgeving en kan worden geëxploiteerd via geauthenticeerde toegang. Daarnaast kunnen geauthenticeerde gebruikers beperkingen omzeilen en de mogelijkheid krijgen om willekeurige bestanden binnen een backuprepository te manipuleren, wat kan leiden tot gegevensmanipulatie of -corruptie. Een aanvaller met beperkte rechten kan toegang krijgen tot opgeslagen SSH-credentials, wat kan leiden tot ongeautoriseerde toegang tot kritieke systemen. De kwetsbaarheid in de hoge beschikbaarheid van Veeam Backup & Replication kan worden geëxploiteerd door een geauthenticeerde gebruiker met de rol van Backup Administrator, wat kan leiden tot compromittering van het systeem. Verder kan een aanvaller met lokale toegang zijn privileges verhogen, wat de beveiligingscontext van backup- en replicatieprocessen in gevaar kan brengen. Tot slot kan een Backup Viewer op afstand code uitvoeren met de privileges van de 'postgres'-gebruiker, wat kan leiden tot ongeautoriseerde acties binnen de databaseomgeving.
Oplossingen
Veeam heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-20
Improper Input Validation

{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Veeam heeft kwetsbaarheden verholpen in Veeam Backup \u0026 Replication.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen een geauthenticeerde domeingebruiker in staat om op afstand code uit te voeren op de backupserver, wat kan leiden tot ongeautoriseerde controle over backupoperaties. Dit probleem is aanwezig in de backupserveromgeving en kan worden ge\u00ebxploiteerd via geauthenticeerde toegang. Daarnaast kunnen geauthenticeerde gebruikers beperkingen omzeilen en de mogelijkheid krijgen om willekeurige bestanden binnen een backuprepository te manipuleren, wat kan leiden tot gegevensmanipulatie of -corruptie. Een aanvaller met beperkte rechten kan toegang krijgen tot opgeslagen SSH-credentials, wat kan leiden tot ongeautoriseerde toegang tot kritieke systemen. De kwetsbaarheid in de hoge beschikbaarheid van Veeam Backup \u0026 Replication kan worden ge\u00ebxploiteerd door een geauthenticeerde gebruiker met de rol van Backup Administrator, wat kan leiden tot compromittering van het systeem. Verder kan een aanvaller met lokale toegang zijn privileges verhogen, wat de beveiligingscontext van backup- en replicatieprocessen in gevaar kan brengen. Tot slot kan een Backup Viewer op afstand code uitvoeren met de privileges van de \u0027postgres\u0027-gebruiker, wat kan leiden tot ongeautoriseerde acties binnen de databaseomgeving.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Veeam heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://www.veeam.com/kb4830"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://www.veeam.com/kb4831"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Veeam Backup \u0026 Replication",
    "tracking": {
      "current_release_date": "2026-03-12T14:54:08.200676Z",
      "generator": {
        "date": "2025-08-04T16:30:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.3"
        }
      },
      "id": "NCSC-2026-0096",
      "initial_release_date": "2026-03-12T14:54:08.200676Z",
      "revision_history": [
        {
          "date": "2026-03-12T14:54:08.200676Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-1"
                }
              }
            ],
            "category": "product_name",
            "name": "Backup \u0026 Replication"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-2"
                }
              }
            ],
            "category": "product_name",
            "name": "Software Appliance"
          }
        ],
        "category": "vendor",
        "name": "Veeam"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-21666",
      "notes": [
        {
          "category": "description",
          "text": "An authenticated domain user can exploit a vulnerability to execute remote code on the Backup Server, potentially compromising system integrity and control.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-21666 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21666.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2"
          ]
        }
      ],
      "title": "CVE-2026-21666"
    },
    {
      "cve": "CVE-2026-21667",
      "notes": [
        {
          "category": "description",
          "text": "An authenticated domain user can exploit a vulnerability to execute remote code on the Backup Server, potentially compromising system integrity and control.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-21667 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21667.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2"
          ]
        }
      ],
      "title": "CVE-2026-21667"
    },
    {
      "cve": "CVE-2026-21668",
      "notes": [
        {
          "category": "description",
          "text": "An authenticated domain user can exploit a vulnerability to bypass restrictions and manipulate arbitrary files on a Backup Repository, potentially compromising data integrity.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-21668 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21668.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2"
          ]
        }
      ],
      "title": "CVE-2026-21668"
    },
    {
      "cve": "CVE-2026-21670",
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability allows a low-privileged user to access and extract saved SSH credentials, potentially compromising secure access to systems.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-21670 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21670.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2"
          ]
        }
      ],
      "title": "CVE-2026-21670"
    },
    {
      "cve": "CVE-2026-21671",
      "notes": [
        {
          "category": "description",
          "text": "An authenticated Backup Administrator can exploit a vulnerability in Veeam Backup \u0026 Replication high availability deployments to achieve remote code execution.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-21671 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21671.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2"
          ]
        }
      ],
      "title": "CVE-2026-21671"
    },
    {
      "cve": "CVE-2026-21672",
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability has been identified in Windows-based Veeam Backup \u0026 Replication servers, allowing attackers to gain elevated access on affected systems.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-21672 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21672.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2"
          ]
        }
      ],
      "title": "CVE-2026-21672"
    },
    {
      "cve": "CVE-2026-21708",
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability allows a Backup Viewer to execute remote code with the privileges of the \u0027postgres\u0027 user, posing a significant security risk.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-21708 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21708.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2"
          ]
        }
      ],
      "title": "CVE-2026-21708"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…