CVE-2026-21672 is a high-severity local privilege escalation issue affecting Windows-based Veeam Backup & Replication servers. The supplied NVD data rates it 8.8 (HIGH) and points to vendor KB references for remediation guidance. Because the attack requires local access and low privileges, the main risk is post-compromise escalation on systems already reachable by an attacker or untrusted user.
CVE-2026-21671 is a critical remote code execution issue in Veeam Backup & Replication high availability (HA) deployments. According to the supplied NVD record, an authenticated user with the Backup Administrator role can trigger RCE, and the issue is rated CVSS 9.1.
CVE-2026-21669 is a critical remote code execution issue affecting Veeam Backup & Replication on the Backup Server. According to the NVD record, the vulnerable range includes versions 13.0.0.496 through before 13.0.1.2067, and the issue can be reached by an authenticated domain user. The CVSS vector indicates network attackability, low attack complexity, required low privileges, no user interaction, and h [truncated]
CVE-2026-21668 is a high-severity issue in Veeam Backup & Replication where an authenticated domain user may bypass restrictions and manipulate arbitrary files on a Backup Repository. NVD lists affected versions from 12.0.0.1402 through 12.3.2.4465. The vendor advisory referenced by NVD is available at Veeam KB4830.