CVE-2025-23114

Description

A vulnerability in Veeam Updater component allows Man-in-the-Middle attackers to execute arbitrary code on the affected server. This issue occurs due to a failure to properly validate TLS certificate.

Category

9.0
CVSS
Severity: Critical
CVSS 3.0 •
EPSS 0.11%
Affected: Veeam Backup for AWS
Affected: Veeam Backup for Microsoft Azure
Affected: Veeam Backup for Google Cloud
Affected: Veeam Backup for Nutanix AHV
Affected: Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization
Affected: Veeam Backup for Salesforce
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-23114?
CVE-2025-23114 has been scored as a critical severity vulnerability.
How to fix CVE-2025-23114?
To fix CVE-2025-23114, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-23114 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-23114 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-23114?
CVE-2025-23114 affects Veeam Backup for AWS, Veeam Backup for Microsoft Azure, Veeam Backup for Google Cloud, Veeam Backup for Nutanix AHV, Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization, Veeam Backup for Salesforce.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.