{"uuid": "722e8821-19fa-48e7-94b5-6adec8d69cea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://t.me/CyberBulletin/2727", "content": "\u26a1Two major vendors just patched remote code execution flaws\u2014update NOW before attackers exploit them.\n\nVeeam Backup (CVE-2025-23120, 9.9/10)\nAffects v12.3.0.310 &amp; earlier\nAllows RCE by authenticated users\nFixed in v12.3.1 (12.3.1.1139)\n\nIBM AIX (CVE-2024-56346 &amp; CVE-2024-56347, 10/10 &amp; 9.6/10)\nAffects AIX 7.2 &amp; 7.3\nExploitable via NIM services\n\n\u26a0\ufe0f No attacks seen yet, but don\u2019t wait\u2014patch immediately.\n\n#CyberBulletin", "creation_timestamp": "2025-03-21T06:44:57.000000Z"}