What are CVE-2025-23120?
The team at watchTower has identified a critical remote command execution vulnerability that impacts Veeam Back and Replication. Veeam is a popular enterprise backup and recovery platform that is often (basically always) deployed in active directory environments. The very nature of backup solutions requires Veeam services to run with privileged access. This gives Veeam a triple crown of popularity, connectivity, and elevated access while, crucially, also managing backups. This makes Veeam Backup a very desirable side quest to target in ransomware attacks.
The vulnerability, identified as CVE-2025-23120, is the spiritual and technical continuation of a deserialization vulnerability that Veeam “patched” in a previous release (CVE-2024-40711). I highly recommend everyone reading this checkout both write ups. It’s a great demonstration of tenacious research and bug hunting. In the case of both vulnerabilities, the moral of the exploitation journey is to never trust a blacklist. Rather than address the vulnerabilities with a whitelist approach, Veeam expanded upon the list of blacklisted classes for derserialization, which (to great surprise) failed to blacklist all abusable classes. Savvy attackers can generate deserialization gadgets living off the bounty of the whitelisted classes.
Exploitation requires authenticated access, however this includes any authenticated domain user of any privilege level. Successful exploitation results in a SYSTEM shell on a high value target. Yikes. Patch ASAP.
How bad is this?
CVE | CVSSv3 Score |
CVE-2025-23120 | 8.8 |
Severity: Critical
- Local or domain credentials are required
- Leverages publicly known .NET deserialization gadgets
- Complex exploitation
Who is affected by this?
Product | Affected From | Affected To |
Veeam Backup and Replication | 12.0.0.1402 | 12.3.1.1139 |
How is it exploited?
This vulnerability is exploitable remotely by an attacker authenticated to a local or domain user group.
How do I protect myself?
This vulnerability can be mitigated by upgrading to Veeam Backup & Replication 12.3.1.
Mitigating factors?
Veeam is not exposed to external nodes, which mitigates exploitation by external threat actors.