Are You Protected? Critical Veeam and IBM Updates Address Severe Flaws

Article Highlights
Off On

In a digital age where vulnerabilities can lead to catastrophic data breaches, Veeam and IBM have rolled out critical security updates to fix severe flaws within their systems. Veeam’s latest update has addressed a significant vulnerability in its Backup & Replication software, allowing remote code execution through inconsistent deserialization handling. Similarly, IBM has patched critical flaws in its AIX operating system, focusing on improper access control that could enable attackers to execute arbitrary commands.

Veeam’s Critical Flaw and Resolution

Veeam’s vulnerability, identified as CVE-2025-23120, has been given a CVSS score of 9.9 out of 10, indicating its grave severity. The flaw, affecting Backup & Replication software versions up to 12.3.0.310, permits remote code execution by authenticated domain users. This flaw was reported by Piotr Bazydlo of watchTowr and has been effectively patched in version 12.3.1 (build 12.3.1.1139). The vulnerability’s primary risk stems from inconsistent handling of deserialization, which could be exploited by any user within the local users group on the Windows host running the Veeam server, and potentially, by any domain user if the server is domain-joined.

To mitigate this risk, Veeam’s patch includes the addition of specific gadgets to the blocklist to prevent any exploitation. However, it remains crucial to recognize that future deserialization gadgets can bypass the blocklist, leading to new vulnerabilities. For this reason, regular updates and vigilant monitoring are essential to maintain robust security protocols and shield against emerging threats in the volatile landscape of cybersecurity.

IBM’s AIX Operating System Vulnerabilities

IBM has confronted two critical vulnerabilities within its AIX operating system, specifically targeting versions 7.2 and 7.3. These vulnerabilities are identified as CVE-2024-56346 and CVE-2024-56347, carrying CVSS scores of 10.0 and 9.6, respectively. The former pertains to improper access control in the nimesis NIM master service, while the latter involves the nimsh service’s SSL/TLS protection mechanisms. Both flaws present significant risks by allowing remote attackers to execute arbitrary commands, potentially compromising system integrity and data security.

Though there have been no reports indicating these vulnerabilities have been exploited in the wild, it is imperative for users to immediately apply the necessary patches. Addressing these security flaws promptly is vital to mitigate potential threats and maintain the safety of critical systems and data. These updates serve as stern reminders of the ever-evolving landscape of cybersecurity, necessitating continual diligence and responsiveness to safeguard against pervasive and increasingly sophisticated threats.

Key Takeaways and Future Considerations

In today’s digital world, where vulnerabilities can lead to major data breaches, Veeam and IBM have launched crucial security updates to fix serious flaws in their systems. Veeam has released an important update to address a significant vulnerability in its Backup & Replication software. This flaw allowed remote code execution due to inconsistent deserialization handling, posing a serious risk to users. Meanwhile, IBM has also taken action by patching critical flaws in its AIX operating system. These vulnerabilities were related to improper access control and could have enabled attackers to execute arbitrary commands. Both companies have acted swiftly to prevent potential security threats and ensure the safety of their users’ data. By addressing these critical issues, Veeam and IBM are working to maintain the integrity and reliability of their systems in a landscape where digital security is paramount. These updates underscore the continued importance of vigilance and proactive measures in safeguarding sensitive information from cyber threats.

Explore more