CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2025-23120

Critical Severity
SVRS
87/100

CVSSv3
9.9/10

EPSS
0.00333/1
A vulnerability allowing remote code execution (RCE) for domain users.
In The Wild
CVSS:3.0
AV:N
AC:L
PR:L
UI:N
S:C
C:H
I:H
A:H
2025-03-20

2025-03-20

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CISA Releases Two ICS Advisories for Vulnerabilities, & Exploits Surrounding ICS
Guru Baran2025-04-02
CISA Releases Two ICS Advisories for Vulnerabilities, & Exploits Surrounding ICS | The Cybersecurity and Infrastructure Security Agency (CISA) released two Industrial Control Systems (ICS) advisories on April 1, 2025, highlighting significant vulnerabilities in critical infrastructure components.  These advisories, ICSA-25-091-01 and ICSA-24-331-04, address security flaws in Rockwell Automation and Hitachi Energy products respectively, providing essential information about vulnerabilities that could potentially compromise industrial operations if exploited. Rockwell […] The post CISA Releases Two ICS Advisories for Vulnerabilities, & Exploits Surrounding
cybersecuritynews.com
rss
forum
news
Rockwell Automation Lifecycle Services with Veeam Backup and Replication
CISA2025-04-01
Rockwell Automation Lifecycle Services with Veeam Backup and Replication | View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation <li
cisa.gov
rss
forum
news
What’s New in Rapid7 Products &amp; Services: Q1 2025 in Review
Margaret Wei2025-04-01
What’s New in Rapid7 Products &amp; Services: Q1 2025 in Review | Read on for Q1 2025 release highlights across the Command Platform, from Exposure Command to Managed Threat Complete.At Rapid7, we started off the year focused on delivering new features and advancements across our products and services to bring you the context needed to prioritize exposures, visualize your attack surface, and accelerate incident response. Read on for Q1 2025 release highlights across the Command Platform, from Exposure
rapid7.com
rss
forum
news
24th March – Threat Intelligence Report - Check Point Research
2025-03-24
24th March – Threat Intelligence Report - Check Point Research | News Content: For the latest discoveries in cyber research for the week of 24th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Municipalities in four US states experienced cyberattacks that disrupted services for county offices, courts, and schools. Cleveland Municipal Court was hit by Qilin ransomware attack, forcing employees offline and delaying trials, while Strafford County, Pelham School District, and Derby Police Department also reported service disruptions which were not claimed by any specific threat actor. Check Point Harmony Endpoint and Threat Emulation provide protection against this threat (Ransomware.Wins.Qilin
google.com
rss
forum
news
⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More
Ajit Jasrotia2025-03-24
⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More | A quiet tweak in a popular open-source tool opened the door to a supply chain breach—what started as a targeted attack quickly spiraled, exposing secrets across countless projects. That wasn’t the only stealth move. A new all-in-one malware is silently stealing passwords, crypto, and control—while hiding in plain sight. And over 300 Android apps joined [&#8230;] The post ⚡ THN Weekly Recap: GitHub Supply Chain Attack
fraud
allhackernews.com
rss
forum
Security Affairs newsletter Round 516 by Pierluigi Paganini – INTERNATIONAL EDITION
Pierluigi Paganini2025-03-23
Security Affairs newsletter Round 516 by Pierluigi Paganini – INTERNATIONAL EDITION | A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. U.S. Treasury removed sanctions against the crypto mixer service Tornado Cash Zero-day broker Operation Zero offers up to [&#8230;] A new round of the weekly SecurityAffairs newsletter
securityaffairs.co
rss
forum
news
Maximum severity vulnerability can lead to server bricking. - The CyberWire
2025-03-22
Maximum severity vulnerability can lead to server bricking. - The CyberWire | News Content: Exploit code published for critical Apache Tomcat vulnerability. Veeam issues patch for critical flaw affecting Backup &amp; Replication software. Stalkerware company sustains data breach. Pennsylvania education union discloses breach. Maximum severity vulnerability can lead to server bricking. A maximum severity vulnerability (CVE-2024-54085) in American Megatrends International's (AMI's) MegaRAC Baseboard Management Controller (BMC) software could allow attackers to hijack and brick vulnerable servers, BleepingComputer reports. MegaRAC BMC is a remote server management tool used by major server vendors, including HPE, Asus, and ASRock. Since these servers
google.com
rss
forum
news

Social Media

⚠️ Vulnerability Alert: Rockwell Automation Lifecycle Services with Veeam Backup and Replication Deserialization Vulnerability 📅 Timeline: Disclosure: 2025-03-20, Patch: 2025-03-19 🆔cveId: CVE-2025-23120 📊baseScore: 9.4 📏cvssMetrics:
0
0
0
🚨 RCE vulnerability (CVE-2025-23120) in Veeam Backup &amp; Replication lets attackers execute arbitrary code via a deserialization flaw. Upgrade to v12.3.1 &amp; disconnect B&amp;R from AD domain to mitigate risk. #Veeam #Backup #Replication #watchTowrLabs ➡️ https://t.co/GdQN7WjRxl https://t.co/yf6B1Z9T9i
0
0
0
Tenable Corrige une faille de gestion incorrecte des permissions dans Nessus Agent (code CVE-2025-23120). https://t.co/o6bZCYeGSO
0
0
0
🚨 A critical vulnerability exists in Veeam Backup &amp; Replication software (CVE-2025-23120). Please see the @ncsc_gov_ie advisory for more info: https://t.co/izXHa9KHVh
0
0
0
🚨 Vulnerabilidad crítica en Veeam permite ejecución remota de código 🔍 CVE-2025-23120 en Veeam Backup &amp; Replication permite a atacantes autenticados ejecutar código remoto mediante el canal .NET, por validación insuficiente de datos. 📌 Fuente: INCIBE-CERT https://t.co/lA2n3JDO0b
0
0
0
Bulletin: CVE-2025-23120 is a critical remote code execution (RCE) vulnerability in Veeam Backup &amp; Replication versions 12.3.0.310 and earlier. Veeam has addressed this vulnerability in version 12.3.1 (build 12.3.1.1139). #ThreatIntel #RedLeggCTI #Veeam https://t.co/zXKAOp6mcT
0
0
0
Two major vendors just patched remote code execution flaws—update NOW before attackers exploit them. 🔴 Veeam Backup (CVE-2025-23120, 9.9/10) ➡️ Affects v12.3.0.310 &amp; earlier ➡️ Allows RCE by authenticated users ➡️ Fixed in v12.3.1 (12.3.1.1139) 🔴 IBM AIX (CVE-2024-56346 &amp; CVE
0
0
0
Veeam patches a critical RCE flaw (CVE-2025-23120) in Backup &amp; Replication software, scoring 9.9 CVSS. Exploitable by domain users, it's fixed in v12.3.1. Also, IBM fixes two critical AIX bugs. Patch ASAP! #CyberSecurity #Vulnerability #TechUpdates
0
0
0
Critical Veeam Backup &amp; Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120) - Help Net Security https://t.co/cAYbV7WZCR
0
0
0
🚨 Threat Alert: Veeam Backup RCE and Free File Converter Malware Campaign 📅 Date: 2025-03-23 📆 Timeline: CVE-2025-23120 discovered in 2025. 📌 Attribution: FBI and industry experts advocate for heightened security. 📝 Summary: This week’s review highlights two significant
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://www.veeam.com/kb4724
134C704F-9B21-4F2E-91B3-4A467353BCC0https://labs.watchtowr.com/by-executive-order-we-are-banning-blacklists-domain-level-rce-in-veeam-backup-replication-cve-2025-23120/
[email protected]https://www.veeam.com/kb4724

CWE Details

CWE IDCWE NameDescription
CWE-502Deserialization of Untrusted DataThe application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence