Lucene search

K
cveMitreCVE-2022-26500
HistoryMar 17, 2022 - 9:15 p.m.

CVE-2022-26500

2022-03-1721:15:08
CWE-22
mitre
web.nvd.nist.gov
1095
In Wild
2
cve-2022-26500
veeam backup & replication
path limitation
remote authentication
arbitrary code execution
api security

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.056

Percentile

93.3%

Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.

Affected configurations

Nvd
Node
veeamveeam_backup_\&_replicationRange10.0.0.444210.0.1.4854
OR
veeamveeam_backup_\&_replicationRange11.0.0.82511.0.1.1261
OR
veeamveeam_backup_\&_replicationMatch9.5.0.1536
OR
veeamveeam_backup_\&_replicationMatch9.5.4.2615
OR
veeamveeam_backup_\&_replicationMatch10.0.1.4854-
OR
veeamveeam_backup_\&_replicationMatch10.0.1.4854p20201202
OR
veeamveeam_backup_\&_replicationMatch10.0.1.4854p20210609
OR
veeamveeam_backup_\&_replicationMatch11.0.1.1261-
OR
veeamveeam_backup_\&_replicationMatch11.0.1.1261p20211123
OR
veeamveeam_backup_\&_replicationMatch11.0.1.1261p20211211
VendorProductVersionCPE
veeamveeam_backup_\&_replication*cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*
veeamveeam_backup_\&_replication9.5.0.1536cpe:2.3:a:veeam:veeam_backup_\&_replication:9.5.0.1536:*:*:*:*:*:*:*
veeamveeam_backup_\&_replication9.5.4.2615cpe:2.3:a:veeam:veeam_backup_\&_replication:9.5.4.2615:*:*:*:*:*:*:*
veeamveeam_backup_\&_replication10.0.1.4854cpe:2.3:a:veeam:veeam_backup_\&_replication:10.0.1.4854:-:*:*:*:*:*:*
veeamveeam_backup_\&_replication10.0.1.4854cpe:2.3:a:veeam:veeam_backup_\&_replication:10.0.1.4854:p20201202:*:*:*:*:*:*
veeamveeam_backup_\&_replication10.0.1.4854cpe:2.3:a:veeam:veeam_backup_\&_replication:10.0.1.4854:p20210609:*:*:*:*:*:*
veeamveeam_backup_\&_replication11.0.1.1261cpe:2.3:a:veeam:veeam_backup_\&_replication:11.0.1.1261:-:*:*:*:*:*:*
veeamveeam_backup_\&_replication11.0.1.1261cpe:2.3:a:veeam:veeam_backup_\&_replication:11.0.1.1261:p20211123:*:*:*:*:*:*
veeamveeam_backup_\&_replication11.0.1.1261cpe:2.3:a:veeam:veeam_backup_\&_replication:11.0.1.1261:p20211211:*:*:*:*:*:*

Social References

More

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.056

Percentile

93.3%