Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.veeam.com/kb4830 |
|
| https://www.veeam.com/kb4831 |
|
Mon, 20 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Administrator Bypass of Windows Driver Signature Enforcement in Veeam Backup and Replication |
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sat, 18 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Administrator Bypass of Windows Driver Signature Enforcement in Veeam Backup and Replication |
Fri, 17 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veeam
Veeam backup And Replication Veeam software Appliance |
|
| Vendors & Products |
Veeam
Veeam backup And Replication Veeam software Appliance |
Fri, 17 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability allowing a local attacker with administrator privileges to bypass Windows Driver Signature Enforcement. | |
| Weaknesses | CWE-77 | |
| References |
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-04-20T14:06:52.636Z
Reserved: 2026-01-04T15:00:06.574Z
Link: CVE-2026-21709
Updated: 2026-04-17T16:07:32.067Z
Status : Awaiting Analysis
Published: 2026-04-17T16:16:36.413
Modified: 2026-04-20T16:16:41.057
Link: CVE-2026-21709
No data.
OpenCVE Enrichment
Updated: 2026-04-20T17:30:12Z