{"vulnerability": "CVE-2022-26500", "sightings": [{"uuid": "4a4349ab-0ed9-4a98-82bb-1e29419fc881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "9e1af554-5e59-47c9-9918-c59715b272d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "seen", "source": "MISP/cec219ff-8f6d-45c9-bdbb-b4fb8c9c0f2b", "content": "", "creation_timestamp": "2023-09-20T10:37:56.000000Z"}, {"uuid": "e47b2fd3-7ccd-4cf5-88f9-6a39faadb5dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971746", "content": "", "creation_timestamp": "2024-12-24T20:33:33.896373Z"}, {"uuid": "1d1188cf-5d7f-41a4-aa2a-f32ff0091746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:36.000000Z"}, {"uuid": "138d9925-190e-4398-bac0-6acec03304fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-26500", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/168346d7-ffb8-4733-91d2-a7fc51bc4446", "content": "", "creation_timestamp": "2026-02-02T12:27:08.776609Z"}, {"uuid": "9823c68e-04b2-424c-aaa7-c22658c8eefb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "seen", "source": "https://t.me/ptswarm/115", "content": "Veeam fixed an Unauth RCE (CVE-2022-26500, CVE-2022-26501) in Veeam Backup &amp; Replication and Local Privilege Escalation (CVE-2022-26503) in Veeam Agent for Microsoft Windows found by our researcher Nikita Petrov.\n\nAdvisory: https://www.veeam.com/kb4288", "creation_timestamp": "2022-03-14T13:38:49.000000Z"}, {"uuid": "0ef28337-5bf5-4de1-a441-de752386ecf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "seen", "source": "https://t.me/cKure/9039", "content": "\u25a0\u25a1\u25a1\u25a1\u25a1 Veeam fixes critical RCEs in backup solution (CVE-2022-26500, CVE-2022-26501).\n\nhttps://www.helpnetsecurity.com/2022/03/15/cve-2022-26500-cve-2022-26501/", "creation_timestamp": "2022-03-15T17:19:30.000000Z"}, {"uuid": "f00554a5-9214-45f0-ad68-6c5424232a6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "published-proof-of-concept", "source": "https://t.me/road_to_oscp/212", "content": "\u0420\u0430\u0437\u0431\u043e\u0440 \u0438  POC \u0434\u043b\u044f 10 \u0438 11 \u0432\u0435\u0440\u0441\u0438\u0438 Veeam Backup(CVE-2022-26500)\n\n\u041d\u0435 \u0442\u0430\u043a \u0434\u0430\u0432\u043d\u043e \u0432 \u0441\u0432\u044f\u0437\u0438 \u0441 \u0440\u0430\u0431\u043e\u0447\u0438\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430\u043c\u0438 \u0441\u0442\u043e\u043b\u043a\u043d\u0443\u043b\u0441\u044f  \u0441 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0432 CVE-2022-26500. \u0412 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0435 \u043d\u0430\u043a\u043e\u043f\u0438\u043b\u043e\u0441\u044c \u043c\u043d\u043e\u0433\u043e \u0437\u0430\u043c\u0435\u0442\u043e\u043a \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0441\u043a\u043e\u043c\u043f\u043e\u043d\u043e\u0432\u0430\u043b, \u043f\u0440\u0438\u0432\u0435\u043b \u0432 \u043f\u043e\u0440\u044f\u0434\u043e\u043a \u0438 \u0442\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0443\u044e \u0432\u0430\u043c \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435  \u043c\u043e\u0435\u0433\u043e \u043f\u0435\u0440\u0432\u043e\u0433\u043e \u0440\u0435\u0441\u0435\u0440\u0447\u0430 (\u043d\u0430\u0434\u0435\u044e\u0441\u044c \u043d\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e).", "creation_timestamp": "2023-06-20T14:53:29.000000Z"}, {"uuid": "35b5df83-4ba8-483b-bef3-1c9b7fbd053d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "seen", "source": "https://t.me/arpsyndicate/966", "content": "#ExploitObserverAlert\n\nCVE-2022-26500\n\nDESCRIPTION: Exploit Observer has 6 entries related to CVE-2022-26500. Improper limitation of path names in Veeam Backup", "creation_timestamp": "2023-12-03T15:25:59.000000Z"}, {"uuid": "c35158a6-29bb-46b8-a904-16088500e6e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "exploited", "source": "https://t.me/itsec_news/315", "content": "\u200b\u26a1\ufe0f Positive Technologie \u0432\u044b\u044f\u0432\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0434\u043b\u044f \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Veeam.\n\n\ud83d\udcac \u042d\u043a\u0441\u043f\u0435\u0440\u0442 Positive Technologies \u041d\u0438\u043a\u0438\u0442\u0430 \u041f\u0435\u0442\u0440\u043e\u0432 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 Veeam. \u0414\u0432\u0435 \u0438\u0437 \u043d\u0438\u0445 \u043a\u0430\u0441\u0430\u044e\u0442\u0441\u044f Veeam Backup &amp; Replication. \u042d\u0442\u043e \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0438\u0440\u0443\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u0431\u044d\u043a\u0430\u043f\u043e\u043c \u0438 \u0430\u0432\u0430\u0440\u0438\u0439\u043d\u044b\u043c \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c. \u0415\u0449\u0451 \u043e\u0434\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0432 Veeam Agent for Microsoft Windows. \u042d\u0442\u043e \u041f\u041e \u0434\u043b\u044f \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 Windows. \n\n\u00ab\u041f\u043e \u043d\u0430\u0448\u0438\u043c \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0430\u043c, \u0434\u0430\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u0443\u0434\u0443\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043d\u0443\u0442 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u043c\u0443 \u0440\u0438\u0441\u043a\u0443 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u0432\u0430\u0436\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0438\u043b\u0438 \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c \u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043c\u0435\u0440\u044b \u0434\u043b\u044f \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0430\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u0439 \u0441 \u044d\u0442\u0438\u043c\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u043c\u0438\u00bb, \u2014 \u043e\u0442\u043c\u0435\u0442\u0438\u043b \u041d\u0438\u043a\u0438\u0442\u0430 \u041f\u0435\u0442\u0440\u043e\u0432.\n\n\u041e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (CVE-2022-26500, CVE-2022-26501), \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0435 \u0432 Veeam Backup &amp; Replication, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 (Remote Code Execution, RCE). \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0432\u0435\u0440\u0441\u0438\u0438 9.5, 10 \u0438 11 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430. \n\n#Windows #\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2022-03-16T14:51:00.000000Z"}, {"uuid": "19754f34-6d68-4fdc-91e2-f511e22b219b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "seen", "source": "Telegram/_GnvdCw3e_nhrG56Sn8S1EmG-9TVuVWf11IDADH1xE2CNwe-", "content": "", "creation_timestamp": "2025-02-06T02:39:18.000000Z"}, {"uuid": "b7080620-0783-4740-83a0-07ed080daf98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26500", "type": "seen", "source": "https://t.me/cibsecurity/39170", "content": "\u203c CVE-2022-26500 \u203c\n\nImproper limitation of path names in Veeam Backup &amp; Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-17T23:21:50.000000Z"}]}