Skip to content

Veeam Users Face New Threat: 'Bug of June 2025' RCE Exploit

A dangerous exploit threatens Veeam users. Act now to protect your backups and data.

In this image we can see a spider on the web and the background is dark.
In this image we can see a spider on the web and the background is dark.

Veeam Users Face New Threat: 'Bug of June 2025' RCE Exploit

A new threat has emerged for Veeam Backup & Replication users. A remote-code-execution (RCE) exploit, dubbed 'Bug of June 2025', is being sold on a clandestine marketplace. This exploit targets specific Veeam 12.x builds and could grant full server control, bypassing standard authentication mechanisms.

The exploit is being sold for $7,000 in cryptocurrency by an unknown entity using the account 'SebastianPereiro'. There are no publicly available search results revealing the company or individual behind this account. Security teams are advised to take immediate action to protect their systems. They should prioritize auditing Active Directory accounts with elevated privileges, verify patch levels on all Veeam servers, and monitor for any anomalous service-account usage.

Enterprises running Veeam in mixed Windows-Linux environments may be especially vulnerable. The exploit requires only a valid Active Directory account, making it accessible to threat actors with domain credentials. Compromised systems could be used to exfiltrate, encrypt, or permanently destroy backups. Organizations delaying patches could extend their exposure window, increasing the risk of a successful breach.

The 'Bug of June 2025' exploit is a serious threat to Veeam users. While it is believed to be related to CVE-2025-23121, no formal proof-of-concept has been released. Security teams must act swiftly to protect their backups and ensure the integrity of their data. Regular patching and vigilant monitoring are crucial to mitigate this risk.

Read also:

Latest