Veeam Backup & Replication 访问控制错误漏洞

漏洞信息

漏洞名称: Veeam Backup & Replication 访问控制错误漏洞

漏洞编号:

  • CVE: CVE-2022-26501

漏洞类型: 权限绕过

漏洞等级: 严重

漏洞描述: ### 受影响产品
Veeam Backup & Replication 是一款广泛使用的企业级备份和复制解决方案,旨在为虚拟、物理和云工作负载提供数据保护。它支持多种部署场景,包括本地部署和云环境,被全球众多组织用于确保数据的安全性和可恢复性。

漏洞说明

该漏洞属于权限绕过类型,存在于Veeam Backup & Replication的10.x和11.x版本中。漏洞的根本原因在于系统的访问控制机制存在缺陷,导致未经授权的用户可能获得不应有的访问权限或执行未授权的操作。攻击者需要具备一定程度的系统访问权限才能利用此漏洞。

影响分析

此漏洞的安全风险极为严重,因为它允许攻击者在未经授权的情况下访问或操作系统,可能导致敏感数据泄露、服务中断或其他恶意操作。由于攻击者需要一定程度的系统访问权限,这意味着内部威胁或已经获得初步访问权限的外部攻击者可能利用此漏洞进行更深层次的攻击。此外,考虑到Veeam Backup & Replication在企业环境中的广泛使用,此漏洞的影响范围可能非常广泛,对依赖该产品进行数据保护的组织构成重大威胁。

产品厂商: Veeam

产品名称: Veeam Backup & Replication

影响版本: 10.x, 11.x

来源: https://github.com/projectdiscovery/nuclei-templates/issues/12650

类型: projectdiscovery/nuclei-templates:github issues

来源概述

Description:

Veeam Backup & Replication 10.x and 11.x contains an incorrect access control issue, allowing unauthorized access or actions, exploit requires attacker to have some level of access to the system.

Severity: Critical
POC:

KEV: True

Shodan Query: NA

Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors are required to provide debug data(-debug) along with the template to help the triage team with validation or can also share a vulnerable environment like docker file.

Rewards will only be given once the template is fully validated by the team. Templates that are incomplete or invalid will not be accepted. Avoid adding code templates for CVEs that can be achieved using HTTP, TCP, or JavaScript. Such templates are blocked by default and won’t produce results, so we prioritize creating templates with other protocols unless exceptions are made.

You can check the FAQ for the Nuclei Templates Community Rewards Program here.


Veeam Backup & Replication 访问控制错误漏洞
http://example.com/2025/07/19/github_2954576940/
作者
lianccc
发布于
2025年7月19日
许可协议