Veeam and IBM Patch Critical Security Vulnerabilities

In an era where cyber threats are increasingly sophisticated, it is essential to stay informed about vulnerabilities in critical software systems. Veeam and IBM have recently issued patches for significant security flaws in their Backup & Replication software and AIX operating system, respectively. These updates are crucial for protecting systems from potential exploitation.

  • ✅ Veeam’s backup software is susceptible to remote code execution.
  • ✅ IBM addresses critical flaws in AIX identified as CVE-2024-56346 and CVE-2024-56347.
  • ✅ Immediate application of patches is vital to safeguarding data integrity.

Staying abreast of these vulnerabilities is a fundamental requirement for organizations aiming to enhance their cybersecurity posture. The following sections delve deeper into the specific risks associated with these flaws and the importance of timely patch management.

CVE-2025-23120: The Veeam Vulnerability

Among the critical vulnerabilities recently discovered is CVE-2025-23120, which affects Veeam’s Backup & Replication software. With a CVSS score of 9.9, this flaw enables remote code execution (RCE) via improperly handled deserialization. This vulnerability affects versions 12.3.0.310 and all earlier builds, putting authenticated users at risk.

This flaw stems from a failure to properly manage deserialization processes, which allows a threat actor to exploit an allow-listed class that can be deserialized. According to security researchers, including Piotr Bazydlo, this flaw underscores the necessity of immediate remediation. Veeam has rolled out a patch in version 12.3.1 (build 12.3.1.1139) to address it, updating the blocklist to include problematic deserialization gadgets. Thus, organizations must prioritize updating their Veeam systems.

IBM’s AIX Critical Issues

Alongside Veeam’s vulnerabilities, IBM has also responded to serious security issues within its AIX operating system. The vulnerabilities, CVE-2024-56346 and CVE-2024-56347, represent serious access control flaws that could allow remote command execution. With CVSS scores of 10.0 and 9.6 respectively, these vulnerabilities demand immediate attention.

The vulnerabilities could allow attackers to execute arbitrary commands remotely via the AIX nimesis and nimsh services. Even though there is currently no evidence of active exploitation, organizations are strongly advised to apply the necessary patches for AIX versions 7.2 and 7.3. Prompt action is essential in minimizing risks and securing network infrastructure.

Conclusion

The timely patches from Veeam and IBM highlight the importance of rigorous patch management and vulnerability awareness in cybersecurity practices. Organizations must adopt a proactive approach to manage and mitigate potential threats effectively. Regular software updates are an integral component of a robust security strategy, ensuring resilience against evolving cyber threats.

Posted In :
Iulian Rotaru Freelance Penetration Tester | Ethical Hacker | Cybersecurity Researcher | Helping Businesses Stay Secure iumiro.com

Follow Us