CVE-2022-26500 (GCVE-0-2022-26500)

Vulnerability from cvelistv5 – Published: 2022-03-17 20:56 – Updated: 2025-10-21 23:15
VLAI? CISA KEV
Summary
Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.
CWE
  • n/a
Assigner
References
https://veeam.com x_refsource_MISC
https://www.veeam.com/kb4288 x_refsource_MISC
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant

Vulnerability ID: CVE-2022-26500

Status: Confirmed

Status Updated: 2022-12-13 00:00 UTC

Exploited: Yes


Timestamps
First Seen: 2022-12-13
Asserted: 2022-12-13

Scope
Notes: KEV entry: Veeam Backup & Replication Remote Code Execution Vulnerability | Affected: Veeam / Backup & Replication | Description: The Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code. | Required action: Apply updates per vendor instructions. | Due date: 2023-01-03 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://www.veeam.com/kb4288; https://nvd.nist.gov/vuln/detail/CVE-2022-26500

Evidence

Type: Vendor Report

Signal: Successful Exploitation

Confidence: 80%

Source: cisa-kev


Details
Cwes CWE-22
Feed CISA Known Exploited Vulnerabilities Catalog
Product Backup & Replication
Due Date 2023-01-03
Date Added 2022-12-13
Vendorproject Veeam
Vulnerabilityname Veeam Backup & Replication Remote Code Execution Vulnerability
Knownransomwarecampaignuse Known

References

Created: 2026-02-02 12:27 UTC | Updated: 2026-02-06 07:17 UTC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:03:33.156Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://veeam.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.veeam.com/kb4288"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-26500",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-03T14:08:12.923583Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2022-12-13",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-26500"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-22",
                "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:15:44.043Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-26500"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2022-12-13T00:00:00+00:00",
            "value": "CVE-2022-26500 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper limitation of path names in Veeam Backup \u0026 Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-17T20:56:44.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://veeam.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.veeam.com/kb4288"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-26500",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper limitation of path names in Veeam Backup \u0026 Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://veeam.com",
              "refsource": "MISC",
              "url": "https://veeam.com"
            },
            {
              "name": "https://www.veeam.com/kb4288",
              "refsource": "MISC",
              "url": "https://www.veeam.com/kb4288"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-26500",
    "datePublished": "2022-03-17T20:56:44.000Z",
    "dateReserved": "2022-03-06T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:15:44.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2022-26500",
      "cwes": "[\"CWE-22\"]",
      "dateAdded": "2022-12-13",
      "dueDate": "2023-01-03",
      "knownRansomwareCampaignUse": "Known",
      "notes": "https://www.veeam.com/kb4288;  https://nvd.nist.gov/vuln/detail/CVE-2022-26500",
      "product": "Backup \u0026 Replication",
      "requiredAction": "Apply updates per vendor instructions.",
      "shortDescription": "The Veeam Distribution Service in the Backup \u0026 Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code.",
      "vendorProject": "Veeam",
      "vulnerabilityName": "Veeam Backup \u0026 Replication Remote Code Execution Vulnerability"
    },
    "fkie_nvd": {
      "cisaActionDue": "2023-01-03",
      "cisaExploitAdd": "2022-12-13",
      "cisaRequiredAction": "Apply updates per vendor instructions.",
      "cisaVulnerabilityName": "Veeam Backup \u0026 Replication Remote Code Execution Vulnerability",
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.0.0.4442\", \"versionEndExcluding\": \"10.0.1.4854\", \"matchCriteriaId\": \"837D781D-E21B-458C-8D4A-59949CE4D580\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0.0.825\", \"versionEndExcluding\": \"11.0.1.1261\", \"matchCriteriaId\": \"FD0C1BCB-A018-4425-AC3D-0CE6EAEF372F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:9.5.0.1536:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BC7D0C1-0A10-4704-B8A0-ADFB8B2BA1BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:9.5.4.2615:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D5BA0C4-F689-4B0E-BBB5-051DEDF40721\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:10.0.1.4854:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"12E8F01F-4E41-46F0-94BC-DD5174DDF393\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:10.0.1.4854:p20201202:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0417823-7418-4294-BE57-0304772DFE39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:10.0.1.4854:p20210609:*:*:*:*:*:*\", \"matchCriteriaId\": \"06BE9B78-075C-48E6-817A-5E0A89983EBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:11.0.1.1261:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC28D606-0A9B-46E5-A88C-8041357979DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:11.0.1.1261:p20211123:*:*:*:*:*:*\", \"matchCriteriaId\": \"8158D6BC-2041-4600-B935-AD928621D987\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:11.0.1.1261:p20211211:*:*:*:*:*:*\", \"matchCriteriaId\": \"54A5147A-341A-4790-AAA8-DF2648423C50\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Improper limitation of path names in Veeam Backup \u0026 Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.\"}, {\"lang\": \"es\", \"value\": \"Una limitaci\\u00f3n inapropiada de los nombres de las rutas en Veeam Backup \u0026amp; Replication versiones 9.5U3, 9.5U4,10.x y 11.x, permite a usuarios remotos autenticados acceder a funciones internas de la API que permiten a atacantes cargar y ejecutar c\\u00f3digo arbitrario\"}]",
      "id": "CVE-2022-26500",
      "lastModified": "2024-11-21T06:54:04.143",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2022-03-17T21:15:08.193",
      "references": "[{\"url\": \"https://veeam.com\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.veeam.com/kb4288\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://veeam.com\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.veeam.com/kb4288\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-26500\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-03-17T21:15:08.193\",\"lastModified\":\"2025-11-03T15:48:03.947\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper limitation of path names in Veeam Backup \u0026 Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.\"},{\"lang\":\"es\",\"value\":\"Una limitaci\u00f3n inapropiada de los nombres de las rutas en Veeam Backup \u0026amp; Replication versiones 9.5U3, 9.5U4,10.x y 11.x, permite a usuarios remotos autenticados acceder a funciones internas de la API que permiten a atacantes cargar y ejecutar c\u00f3digo arbitrario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-12-13\",\"cisaActionDue\":\"2023-01-03\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Veeam Backup \u0026 Replication Remote Code Execution Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0.4442\",\"versionEndExcluding\":\"10.0.1.4854\",\"matchCriteriaId\":\"837D781D-E21B-458C-8D4A-59949CE4D580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0.825\",\"versionEndExcluding\":\"11.0.1.1261\",\"matchCriteriaId\":\"FD0C1BCB-A018-4425-AC3D-0CE6EAEF372F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:9.5.0.1536:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC7D0C1-0A10-4704-B8A0-ADFB8B2BA1BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:9.5.4.2615:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D5BA0C4-F689-4B0E-BBB5-051DEDF40721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:10.0.1.4854:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"12E8F01F-4E41-46F0-94BC-DD5174DDF393\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:10.0.1.4854:p20201202:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0417823-7418-4294-BE57-0304772DFE39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:10.0.1.4854:p20210609:*:*:*:*:*:*\",\"matchCriteriaId\":\"06BE9B78-075C-48E6-817A-5E0A89983EBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:11.0.1.1261:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC28D606-0A9B-46E5-A88C-8041357979DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:11.0.1.1261:p20211123:*:*:*:*:*:*\",\"matchCriteriaId\":\"8158D6BC-2041-4600-B935-AD928621D987\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:veeam:veeam_backup_\\\\\u0026_replication:11.0.1.1261:p20211211:*:*:*:*:*:*\",\"matchCriteriaId\":\"54A5147A-341A-4790-AAA8-DF2648423C50\"}]}]}],\"references\":[{\"url\":\"https://veeam.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.veeam.com/kb4288\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://veeam.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.veeam.com/kb4288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-26500\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://veeam.com\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.veeam.com/kb4288\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T05:03:33.156Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-26500\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-03T14:08:12.923583Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-12-13\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-26500\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2022-12-13T00:00:00+00:00\", \"value\": \"CVE-2022-26500 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-26500\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-03T15:27:39.848Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://veeam.com\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.veeam.com/kb4288\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper limitation of path names in Veeam Backup \u0026 Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2022-03-17T20:56:44.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://veeam.com\", \"name\": \"https://veeam.com\", \"refsource\": \"MISC\"}, {\"url\": \"https://www.veeam.com/kb4288\", \"name\": \"https://www.veeam.com/kb4288\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Improper limitation of path names in Veeam Backup \u0026 Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2022-26500\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"cve@mitre.org\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-26500\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:15:44.043Z\", \"dateReserved\": \"2022-03-06T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2022-03-17T20:56:44.000Z\", \"assignerShortName\": \"mitre\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…