PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-21671 Veeam CVE debrief

CVE-2026-21671 is a critical remote code execution issue in Veeam Backup & Replication high availability (HA) deployments. According to the supplied NVD record, an authenticated user with the Backup Administrator role can trigger RCE, and the issue is rated CVSS 9.1.

Vendor
Veeam
Product
CVE-2026-21671
CVSS
CRITICAL 9.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-12
Original CVE updated
2026-05-10
Advisory published
2026-03-12
Advisory updated
2026-05-10

Who should care

Administrators and security teams responsible for Veeam Backup & Replication, especially HA deployments and environments where Backup Administrator accounts exist or are broadly delegated.

Technical summary

NVD describes the issue as affecting Veeam Backup & Replication versions 13.0.0.496 through 13.0.1.1071. The vulnerability requires authentication and high privileges (Backup Administrator role), but can lead to remote code execution over the network. NVD maps the weakness to CWE-94 and CWE-693 and scores it CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H.

Defensive priority

Urgent. Although the attacker needs a privileged authenticated account, the impact is full RCE in HA deployments and the CVSS score is critical. Prioritize patching and review privileged access to backup infrastructure immediately.

Recommended defensive actions

  • Verify whether any Veeam Backup & Replication HA deployments are running versions 13.0.0.496 through 13.0.1.1071.
  • Apply the vendor remediation referenced by Veeam KB4831 as soon as possible.
  • Review and minimize Backup Administrator role assignments; confirm all privileged accounts are required and monitored.
  • Audit HA deployment access paths and restrict administrative access to trusted management networks and hosts.
  • Check backup infrastructure logs for unexpected privileged logins or unusual administrative activity around the affected versions.
  • Confirm recovery procedures and backup integrity after remediation.

Evidence notes

This debrief is based on the supplied official NVD record for CVE-2026-21671, which references the Veeam vendor advisory at https://www.veeam.com/kb4831. The supplied metadata lists the vulnerable version range as 13.0.0.496 through 13.0.1.1071, the CVSS vector as CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H, and the published/modified dates as 2026-03-12 and 2026-05-10. No Known Exploited Vulnerability (KEV) entry was included in the supplied data.

Official resources

Publicly disclosed in the official CVE/NVD record on 2026-03-12 and modified on 2026-05-10; no KEV listing was provided in the supplied corpus.