Please keep in mind that Veeam Agent for Microsoft Windows (VAW) has two primary operation modes, either standalone or managed. When VAW is managed by Veeam Backup & Replication (VBR) or Veeam Service Provider Console (VSPC), the VAW deployment must be upgraded by the server that manages it. Directly upgrading a VAW deployment that VBR manages will likely result in a compatibility issue if the deployed VAW version is higher than the VBR software expects.
This vulnerability in Veeam Agent for Microsoft Windows allows for Local Privilege Escalation.
Severity: High
CVSS v3.1 Score: 7.2AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
This vulnerability was reported by Yashar Shahinzadeh (Voorivex Team).
The vulnerability documented in this article was fixed starting in the following build:
This build of Veeam Agent for Microsoft Windows was included with Veeam Backup & Replication 12.1.2.172.
If this KB article did not resolve your issue or you need further assistance with Veeam software, please create a Veeam Support Case.
To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.
This form is only for KB Feedback/Suggestions, if you need help with the software open a support case