CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-21666
9.90.30%

CVE-2026-21666: Authenticated Remote Code Execution in Veeam Backup & Replication

Amit Schendel
Amit Schendel
Senior Security Researcher

Mar 20, 2026·7 min read·6 visits

PoC AvailableRansomware Use

Executive Summary (TL;DR)

Authenticated domain users can achieve RCE on Veeam Backup & Replication servers via CRLF injection in service configuration parsing, fully compromising the backup infrastructure.

CVE-2026-21666 is a critical remote code execution (RCE) vulnerability in Veeam Backup & Replication. By leveraging improper input validation, an authenticated domain user can inject arbitrary commands via newline characters, leading to execution with system-level privileges on the backup server infrastructure.

Vulnerability Overview

CVE-2026-21666 is an authenticated remote code execution vulnerability located in the core service handling mechanisms of Veeam Backup & Replication. The vulnerability allows any user with valid Active Directory domain credentials, regardless of their specific privileges within the Veeam environment, to execute arbitrary code on the underlying Backup Server. This execution occurs within the context of the high-privileged service account running the Veeam application, which is typically the SYSTEM or root equivalent.

The flaw exists in the input validation routines responsible for processing configuration directives sent via Veeam's proprietary service ports, specifically TCP ports 9392 and 9401. These endpoints handle administrative routines and inter-node communication between the central Backup Server and distributed backup proxies or repositories. The lack of strict sanitization on these endpoints exposes a direct pathway for command injection.

Exploitation grants the attacker complete control over the backup infrastructure. The attacker acquires the ability to extract credentials stored in the Veeam database, manipulate backup jobs, and destroy existing ransomware-resistant backups. The vulnerability carries a CVSS v3.1 base score of 9.9, reflecting its network-based attack vector, low complexity, and the critical nature of the compromised systems.

Root Cause Analysis

The root cause of CVE-2026-21666 is a failure to properly neutralize Carriage Return and Line Feed (CRLF) character sequences within user-supplied input. When the Veeam Backup Server processes authenticated requests containing configuration parameters for connected Linux-based Backup Proxies or Hardened Repositories, it dynamically constructs service execution files or environment variables. The parser accepts specialized character sequences, such as specific escape characters followed by a newline, without stripping or encoding them.

The vulnerability materializes when the backup service writes these dynamically constructed configurations to disk or passes them to process execution functions. The application expects the input to remain within the confines of a single configuration directive, such as an environment assignment in a systemd unit file. By injecting CRLF characters, the attacker terminates the intended directive and initiates a new one.

Once the attacker successfully injects new directives, they can append arbitrary commands to the configuration file. For example, injecting a pre-execution directive allows the attacker to specify a system command that the service manager will execute before the legitimate backup service starts. The host operating system processes this manipulated configuration file, resulting in the execution of the attacker's payload with the privileges of the modified service.

This flaw highlights an architectural anti-pattern where complex input from moderately trusted sources is passed directly into low-level system configuration contexts. The assumption that standard domain authentication provides sufficient authorization for these specific API endpoints contributed to the severity of the flaw.

Code and Payload Analysis

The vulnerability manifests in the routines responsible for generating proxy configuration structures. The vulnerable implementation utilizes standard string concatenation to build environment variable assignments. The code takes a parameter provided via the API and appends it to a predefined template string without passing it through a validation function that strips control characters.

In the unpatched version, the system processes a variable assignment similar to setting an environment variable via string formatting. If the attacker supplies an input containing a newline character followed by an execution directive, the resulting string spans multiple lines. The service manager interprets the first line as a closed environment variable and the second line as a distinct, executable directive.

# Conceptual Vulnerable Code Pattern
def generate_service_config(user_input):
    # No sanitization on user_input
    config = f'Environment="PARAM={user_input}"'
    write_to_unit_file(config)

The vendor patch in version 12.3.2.4465 introduces strict input validation functions that process all parameters destined for configuration files. The patch implements a sanitization routine that actively strips line feed and carriage return characters from the input stream before concatenation. The updated parser also enforces strict regular expression matching to ensure parameters contain only expected alphanumeric characters and specific, safe symbols.

# Conceptual Patched Code Pattern
import re
def sanitize_input(param):
    # Strip CRLF and validate input
    clean_param = re.sub(r'[\r\n]', '', param)
    return clean_param

Exploitation & Attack Methodology

Exploitation requires the attacker to possess valid credentials for a standard domain user within the Active Directory environment trusted by the Veeam infrastructure. The attacker establishes a network connection to the Veeam Backup Server's management API on TCP port 9392 or 9401. Upon successful authentication, the attacker gains access to the endpoints responsible for infrastructure configuration.

The attacker constructs a malicious payload containing the CRLF injection sequence and the desired shell commands. This payload is embedded within a standard API request, often disguised as a routine configuration update or proxy heartbeat message. The attacker transmits the request to the vulnerable endpoint, leveraging the established authenticated session.

The Veeam service processes the request and writes the manipulated configuration to the target node. The attacker then triggers a service restart or relies on scheduled job execution to force the system to evaluate the modified configuration file. The underlying operating system executes the injected commands with the privileges of the service account, granting the attacker full remote code execution.

Impact Assessment

Successful exploitation of CVE-2026-21666 results in a complete compromise of the Veeam Backup & Replication server. The attacker gains the ability to execute arbitrary commands with SYSTEM privileges on Windows hosts or root privileges on Linux-based proxies. This level of access bypasses all application-level role-based access controls implemented within the Veeam console.

The attacker gains direct access to the backend database storing operational metadata and credentials. This includes the ability to extract plaintext or decryptable passwords used for accessing storage arrays, cloud environments, and secondary network segments. The attacker also acquires the capability to delete, encrypt, or subtly modify existing backup chains, destroying the organization's primary disaster recovery mechanism.

Ransomware syndicates systematically target backup infrastructure to maximize operational disruption and force ransom payments. These groups actively monitor for Veeam vulnerabilities and rapidly integrate them into their exploit arsenals. Exploitation allows these actors to conduct lateral movement, credential harvesting, and immediate deployment of file-encrypting malware across the highly trusted backup network segment.

Remediation & Defensive Posture

Organizations must immediately upgrade their Veeam Backup & Replication installations to version 12.3.2.4465. The upgrade process requires applying the patch to the central Backup Server and subsequently pushing the updated components to all distributed backup proxies, repository servers, and mount servers. Incomplete deployment across the environment leaves secondary nodes vulnerable to subsequent lateral movement.

While patching provides the definitive fix, network segmentation significantly reduces the likelihood of successful exploitation. Administrators must isolate the backup infrastructure on a dedicated, highly restricted management VLAN. Access to the Veeam administrative ports must be strictly controlled via network firewalls and restricted to authorized jump hosts or administrative subnets.

Organizations must implement the principle of least privilege for all domain accounts. Relying on standard domain user authentication as the sole barrier to the Veeam API is insufficient. Administrators must enforce Multi-Factor Authentication for all interactions with the Veeam console and monitor Active Directory logs for anomalous authentication patterns originating from non-administrative subnets.

Official Patches

VeeamVeeam Security Advisory and Patch Download

Technical Appendix

CVSS Score
9.9/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Probability
0.30%
Top 47% most exploited

Affected Systems

Veeam Backup & Replication

Affected Versions Detail

Product
Affected Versions
Fixed Version
Veeam Backup & Replication
Veeam
< 12.3.2.446512.3.2.4465
AttributeDetail
CWE IDCWE-93 / CWE-77
Attack VectorNetwork
CVSS v3.1 Score9.9 (Critical)
EPSS Score0.00301 (53.14%)
Exploit StatusWeaponized Potential / PoC
Privileges RequiredLow (Domain User)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1059.004Command and Scripting Interpreter: Unix Shell
Execution
T1490Inhibit System Recovery
Impact
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')

The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes CR and LF characters before the input is included in outgoing messages, command streams, or files.

Vulnerability Timeline

Initial disclosure by Veeam and publication of KB4830
2026-03-12
CVE-2026-21666 assigned and published to NVD
2026-03-12
Security researchers provide high-level technical context
2026-03-13

References & Sources

  • [1]Veeam Security Advisory (KB4830)
  • [2]NVD Record
  • [3]CVE.org Record
  • [4]Tenable CVE Tracker
  • [5]The Hacker News Coverage
  • [6]CSO Online Report
Related Vulnerabilities
CVE-2026-21667CVE-2026-21708

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.