Multiple vulnerabilities have been reported in Veeam Backup & Replication which could be exploited by an authenticated attacker to execute arbitrary code, bypass security restrictions and gain elevated privileges on the targeted system.
Target Audience:
Enterprises and Large Organizations, cloud service providers using Veeam products.
Impact Assessment:
Potential for remote code execution, file manipulation, authentication bypass and privilege escalation.
The information provided herein is on "as is" basis, without warranty of any kind.