CVE-2026-21671
Critical
|9.1Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with the Backup Administrator role to run malicious code remotely on systems using Veeam Backup & Replication in high availability setups. The attacker must already have authenticated access to the system, which makes it critical to limit who can hold that role.
Technical Description
A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$6,000($5K-$15K)
Vendor Response
Grade APatched in 0 days
Quick Information
Published
Mar 12, 2026
26 days ago
Last Modified
Mar 12, 2026
26 days ago