{"api_version":"1","generated_at":"2026-04-24T04:42:26+00:00","cve":"CVE-2023-27532","urls":{"html":"https://cve.report/CVE-2023-27532","api":"https://cve.report/api/cve/CVE-2023-27532.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-27532","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-27532"},"summary":{"title":"Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability","description":"Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts.","state":"PUBLIC","assigner":"support@hackerone.com","published_at":"2023-03-10 22:15:00","updated_at":"2023-03-16 17:23:00"},"problem_types":["CWE-306"],"metrics":[],"references":[{"url":"https://www.veeam.com/kb4424","name":"https://www.veeam.com/kb4424","refsource":"MISC","tags":[],"title":"KB4424: CVE-2023-27532","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-27532","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27532","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"27532","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veeam","cpe5":"backup_\\&_replication","cpe6":"11.0.1.1261","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27532","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veeam","cpe5":"backup_\\&_replication","cpe6":"11.0.1.1261","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27532","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veeam","cpe5":"backup_\\&_replication","cpe6":"11.0.1.1261","cpe7":"p20211123","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27532","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veeam","cpe5":"backup_\\&_replication","cpe6":"11.0.1.1261","cpe7":"p20211211","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27532","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veeam","cpe5":"backup_\\&_replication","cpe6":"11.0.1.1261","cpe7":"p20220302","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27532","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"veeam","cpe5":"backup_\\&_replication","cpe6":"12.0.0.1420","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2023","cve_id":"27532","cve":"CVE-2023-27532","vendorProject":"Veeam","product":"Backup & Replication","vulnerabilityName":"Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability","dateAdded":"2023-08-22","shortDescription":"Veeam Backup & Replication Cloud Connect component contains a missing authentication for critical function vulnerability that allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts.","requiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","dueDate":"2023-09-12","knownRansomwareCampaignUse":"Known","notes":"https://www.veeam.com/kb4424;  https://nvd.nist.gov/vuln/detail/CVE-2023-27532","cwes":"CWE-306","catalogVersion":"2026.04.23","updated_at":"2026-04-23 17:27:11"},"epss":{"cve_year":"2023","cve_id":"27532","cve":"CVE-2023-27532","epss":"0.838080000","percentile":"0.992980000","score_date":"2026-04-23","updated_at":"2026-04-24 00:02:52"},"legacy_qids":[{"cve":"CVE-2023-27532","qid":"378062","title":"Veeam Backup and Replication Access Control Vulnerability (kb4424)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2023-27532","ASSIGNER":"support@hackerone.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Veeam Backup & Replication","version":{"version_data":[{"version_value":"Fixed Versions: v12 (build 12.0.0.1420 P20230223)"},{"version_value":"11a (build 11.0.1.1261 P20230227)"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Missing Authentication for Critical Function (CWE-306)"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.veeam.com/kb4424","url":"https://www.veeam.com/kb4424"}]},"description":{"description_data":[{"lang":"eng","value":"Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts."}]}},"nvd":{"publishedDate":"2023-03-10 22:15:00","lastModifiedDate":"2023-03-16 17:23:00","problem_types":["CWE-306"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veeam:backup_\\&_replication:11.0.1.1261:p20211123:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veeam:backup_\\&_replication:11.0.1.1261:p20211211:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veeam:backup_\\&_replication:11.0.1.1261:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veeam:backup_\\&_replication:11.0.1.1261:p20220302:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veeam:backup_\\&_replication:12.0.0.1420:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:veeam:backup_\\&_replication:11.0.1.1261:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}