7.8
CVSSv3

CVE-2022-26503

Published: 17/03/2022 Updated: 23/03/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Deserialization of untrusted data in Veeam Agent for Windows 2.0, 2.1, 2.2, 3.0.2, 4.x, and 5.x allows local users to run arbitrary code with local system privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

veeam veeam 2.0

veeam veeam 2.1

veeam veeam 2.2

veeam veeam 3.0.2

veeam veeam

Github Repositories

Journey during my 100 days of Homelab in 2022

100DaysOfHomeLab Twitter: #100DaysOfHomeLab Day 001 - onprem Confluence upgrade to 7181 Critical security issue Day 002 - Updating server via ansible Day 003 - creating VM and installing + configuring OS for pi-hole Day 004 - pi-HOLE installed Installation admin web page Day 005 - Backing up wife's computer before re-

CVE-2022-26503 Summary: Vulnerability (CVE-2022-26503) in Veeam Agent for Microsoft Windows allows local privilege escalation An attacker who successfully exploited this vulnerability could run arbitrary code with LOCAL SYSTEM privileges Shout out to @ultrayoba The Patch: The implemented patch shows blood trail of Deserialization: Veeam official KB mentions