[CVE-2022-26500] Veeam Backup & Replication Remote Code Execution Vulnerability

SecurityDesk
2022.12.13 00:00 조회 9

CISA KEV 정보

취약점명Veeam Backup & Replication Remote Code Execution Vulnerability
설명The Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code.
조치사항Apply updates per vendor instructions.
랜섬웨어 캠페인 악용Known
CWECWE-22
등록일 (KEV)2022-12-13
조치 기한2023-01-03
추가 참고https://www.veeam.com/kb4288; https://nvd.nist.gov/vuln/detail/CVE-2022-26500

NVD 상세 정보

CVSS v3.1: 8.8 HIGHCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0: 6.5 AV:N/AC:L/Au:S/C:P/I:P/A:P

설명: Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.

CWE: CWE-22 | CWE-22

참조

This product uses the NVD API but is not endorsed or certified by the NVD.



바로 가기

IT 도구 서랍

→ Unix: 2025-01-15T09:30:00
→ 날짜: 1736934600

→ ASCII: ABC
→ 문자: 65 66 67

ASCII 코드표 — 클릭하면 입력란에 추가

DecHex약어설명
DecHex문자
DecHex문자

→ 유니코드: 홍길동
→ 문자: \ud64d\uae38\ub3d9