Veeam has released critical security updates for its Backup & Replication product to address seven high‑severity vulnerabilities that could allow attackers to take over backup servers and tamper with stored backups. Users can exploit these flaws if they have valid domain or Veeam accounts. Review the Cybersecurity Threat Advisory now to protect you and your clients’ environments.
What is the threat?
The vulnerabilities—CVE‑2026‑21666, 21667, 21668, 21669, 21671, 21672, and 21708—create multiple paths for attackers with authenticated access to compromise Veeam Backup & Replication servers.
Once an attacker gains any form of valid credentials, these vulnerabilities provide several ways to take over the backup server, deploy malware, move laterally, or quietly corrupt backups—significantly increasing the impact of ransomware or destructive attacks.
Why is it noteworthy?
Veeam Backup & Replication is widely deployed as a core backup and recovery platform. Compromising it directly impacts business continuity.
Ransomware groups specifically target backup systems to weaken recovery efforts. These vulnerabilities carry CVSS scores up to 9.9 and require only authenticated access—credentials attackers frequently obtain via phishing, credential theft, or exploiting unrelated weaknesses.
Because patches are now public, attackers can reverse‑engineer them to identify vulnerable systems. Unpatched Veeam instances are likely to become high‑priority targets in the near term.
What is the exposure or risk?
Organizations running unpatched versions risk:
- Remote code execution: Several flaws (21666, 21667, 21669, 21671) allow a domain user or Veeam Backup Administrator to run arbitrary code on the backup server.
- Privilege escalation:
- CVE‑2026‑21708 allows a low‑privilege Backup Viewer to execute code as the PostgreSQL user.
- CVE‑2026‑21672 allows local users on Windows‑based Veeam servers to elevate privileges.
- Backup manipulation: CVE‑2026‑21668 enables authenticated domain users to bypass repository protections and modify or delete backup files.
- Lateral movement into hypervisors, storage systems, and other critical infrastructure
In a ransomware incident, this can lead directly to prolonged downtime, higher operational impact, and potential permanent data loss.
What are the recommendations?
Barracuda strongly recommends the following defensive measures:
- Patch immediately: Upgrade all V12.x deployments to 12.3.2.4465 or later, and all affected V13.x deployments to 13.0.1.2067 or later. Ensure all components—servers, proxies, repositories, and HA nodes—are updated.
- Harden access: Restrict Veeam to dedicated management or backup networks, avoid direct internet exposure, enforce MFA, and apply least‑privilege roles—especially for Backup Administrator and Backup Viewer.
- Monitor aggressively: Centralize and review logs for unusual backup job modifications, unexpected repository file activity, new tasks, or abnormal PostgreSQL operations.
- Validate backup integrity: Regularly test restores and maintain offline, immutable, or otherwise isolated backup copies to ensure recovery even if the primary environment is compromised.
- Strengthen response readiness: Update incident response playbooks for Veeam exploitation scenarios. If suspicious activity is detected, perform a formal investigation, rotate credentials, and review backup configurations and retention settings.
References
For more in-depth information about the recommendations, please visit the following links:
If you have any questions about this Cybersecurity Threat Advisory, don’t hesitate to get in touch with Barracuda Managed XDR’s Security Operations Center.

