CVE-2026-21669
Published: 12 March 2026
Description
A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2026-21669 by requiring timely remediation of the code injection flaw through patching as specified in the vendor advisory.
Prevents code injection (CWE-94) exploitation by enforcing validation of all information inputs to the Backup Server, blocking arbitrary code execution.
Limits the impact of successful RCE by ensuring low-privilege domain users and processes have only necessary access rights on the Backup Server.
Security SummaryAI
CVE-2026-21669 is a code injection vulnerability (CWE-94) that enables an authenticated domain user to execute arbitrary code remotely on the affected Backup Server. Published on 2026-03-12, it carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, and potential for high-impact privilege escalation across security scopes.
An attacker requires only valid low-privilege domain user credentials to exploit the vulnerability over the network without user interaction. Successful exploitation grants remote code execution on the Backup Server, allowing full control over the system, including potential data exfiltration, modification, or disruption.
Mitigation details are provided in the vendor advisory at https://www.veeam.com/kb4831.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Code injection vulnerability enables authenticated remote code execution on Backup Server, directly facilitating T1210 (Exploitation of Remote Services) for initial access/escalation and T1068 (Exploitation for Privilege Escalation) due to low-priv to full system control.