Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.veeam.com/kb4830 |
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Authenticated Domain User in Veeam Backup and Replication |
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veeam veeam Backup \& Replication
|
|
| CPEs | cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Veeam veeam Backup \& Replication
|
Fri, 20 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Authenticated Domain User in Veeam Backup and Replication |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veeam
Veeam backup And Replication |
|
| Vendors & Products |
Veeam
Veeam backup And Replication |
Thu, 12 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
ssvc
|
Thu, 12 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-03-13T03:55:44.508Z
Reserved: 2026-01-02T15:00:02.871Z
Link: CVE-2026-21667
Updated: 2026-03-12T15:33:12.372Z
Status : Analyzed
Published: 2026-03-12T15:16:13.133
Modified: 2026-03-31T01:01:37.427
Link: CVE-2026-21667
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:09:36Z