PatchSiren

Veeam CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

HIGH Veeam CVE published 2026-03-12

CVE-2026-21672

CVE-2026-21672 is a high-severity local privilege escalation issue affecting Windows-based Veeam Backup & Replication servers. The supplied NVD data rates it 8.8 (HIGH) and points to vendor KB references for remediation guidance. Because the attack requires local access and low privileges, the main risk is post-compromise escalation on systems already reachable by an attacker or untrusted user.

CRITICAL Veeam CVE published 2026-03-12

CVE-2026-21671

CVE-2026-21671 is a critical remote code execution issue in Veeam Backup & Replication high availability (HA) deployments. According to the supplied NVD record, an authenticated user with the Backup Administrator role can trigger RCE, and the issue is rated CVSS 9.1.

CRITICAL Veeam CVE published 2026-03-12

CVE-2026-21669

CVE-2026-21669 is a critical remote code execution issue affecting Veeam Backup & Replication on the Backup Server. According to the NVD record, the vulnerable range includes versions 13.0.0.496 through before 13.0.1.2067, and the issue can be reached by an authenticated domain user. The CVSS vector indicates network attackability, low attack complexity, required low privileges, no user interaction, and h [truncated]

HIGH Veeam CVE published 2026-03-12

CVE-2026-21668

CVE-2026-21668 is a high-severity issue in Veeam Backup & Replication where an authenticated domain user may bypass restrictions and manipulate arbitrary files on a Backup Repository. NVD lists affected versions from 12.0.0.1402 through 12.3.2.4465. The vendor advisory referenced by NVD is available at Veeam KB4830.