-
Notifications
You must be signed in to change notification settings - Fork 3.1k
Description
Description:
Veeam Backup & Replication contains an improper limitation of path names caused by insufficient validation in internal API functions, letting remote authenticated users upload and execute arbitrary code.
Severity: High
(CVSS: 8.8)
Vulnerability Details:
- CVE ID: CVE-2022-26500
- CWE: CWE-22 (Improper Limitation of a Pathname to a Restricted Directory)
- Affected Versions: 9.5U3, 9.5U4, 10.x, and 11.x
- Attack Vector: Network
- Authentication: Required (logged_in)
- Impact: Remote Code Execution
POC:
- https://cloudsek.com/threatintelligence/multiple-rce-vulnerabilities-affecting-veeam-backup-replication/
- https://www.veeam.com/kb4288
KEV: True ✅
CISA KEV: Added 2022-12-13
Known Ransomware Campaign: Yes (Cuba, AvosLocker, LockBit)
EPSS Score: 0.25477 (96.037th percentile)
Shodan Query: "Veeam Backup" http.title:"Veeam Backup Enterprise Manager"
Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors must share vulnerable setup information or a testable instance by emailing [email protected]. Providing a testable instance significantly reduces validation time and increases the chance of quicker rewards. Templates that are incomplete, invalid, or non-verifiable will not be accepted. Avoid submitting code templates for CVEs that can be detected using HTTP, TCP, or JavaScript only these are blocked by default and will not produce results. Exceptions may apply for certain cases. Do not submit AI-simulated vulnerable environments. To qualify for the bounty, the team must be able to fully validate the POC. If you have hosted a vulnerable environment for validation, send the details (IP or Docker setup) along with the PR number to templates[at]projectdiscovery.io
References:
- https://veeam.com
- https://www.veeam.com/kb4288
- https://securelist.com/cuba-ransomware/110533/
- https://www.kroll.com/en/insights/publications/cyber/avoslocker-ransomware-update
- https://blog.qualys.com/vulnerabilities-threat-research/2025/05/08/inside-lockbit-defense-lessons-from-the-leaked-lockbit-negotiations
You can check the FAQ for the Nuclei Templates Community Rewards Program here