Security Advisory 2023-016

Release Date:

High Vulnerability in Veeam Backup & Replication



  • 09/03/2023 --- v1.0 -- Initial publication


On March 8, 2023, Veeam released a new security advisory revealing one high vulnerability in a Veeam Backup & Replication component [1]. This vulnerability is identified by CVE-2023-27532 (CVSS score of 7.5) and it may allow an attacker to obtain encrypted credentials stored in the configuration database. This may lead to gaining access to the backup infrastructure hosts.

It is highly recommended installing the latest version.

Technical Details

The CVE-2023-27532 is caused by the vulnerable process Veeam.Backup.Service.exe (TCP 9401 by default) that allows an unauthenticated user to request encrypted credentials.

Affected Products

This vulnerability affects all Veeam Backup & Replication versions. \

All new deployments of Veeam Backup & Replication versions 12 and 11 installed using the ISO images dated 20230223 (V12) and 20230227 (V11) or later are not vulnerable.


It is highly recommended updating to a supported [2] and fixed version:

  • Version 12 (build P20230223) [3];
  • Version 11a (build P20230227) [4].


If you use an all-in-one Veeam appliance with no remote backup infrastructure components, you can alternatively block external connections to port TCP 9401 in the backup server firewall as a temporary remediation until the patch is installed.






We got cookies

We only use cookies that are necessary for the technical functioning of our website. Find out more on here.