CVE-2026-21671

Critical
|9.1
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with the Backup Administrator role to run malicious code remotely on systems using Veeam Backup & Replication in high availability setups. The attacker must already have authenticated access to the system, which makes it critical to limit who can hold that role.

Technical Description

A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$6,000($5K-$15K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Mar 12, 2026

26 days ago

Last Modified

Mar 12, 2026

26 days ago