Cyber Posture

CVE-2025-48983

Critical

Published: 31 October 2025

Published
31 October 2025
Modified
01 December 2025
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0024 46.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-48983 is a critical-severity Improper Access Control (CWE-284) vulnerability in Veeam Veeam Backup \& Replication. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 46.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces proper access controls to mitigate the improper access control (CWE-284) in Veeam Mount service that enables RCE by authenticated domain users.

prevent

Applies least privilege to restrict low-privilege authenticated domain users from achieving RCE on backup infrastructure hosts via the vulnerable Mount service.

prevent

Requires timely flaw remediation, such as patching the critical RCE vulnerability in Veeam Backup & Replication's Mount service per official mitigations.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability enables remote code execution (RCE) in the Mount service by low-privileged authenticated domain users, directly facilitating Exploitation of Remote Services (T1210) for lateral movement and Exploitation for Privilege Escalation (T1068) due to the privilege increase and changed scope.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability in the Mount service of Veeam Backup & Replication, which allows for remote code execution (RCE) on the Backup infrastructure hosts by an authenticated domain user.

Deeper analysisAI

CVE-2025-48983 is a critical vulnerability in the Mount service of Veeam Backup & Replication that allows remote code execution (RCE) on backup infrastructure hosts. Published on 2025-10-31, it carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-284 (Improper Access Control).

The vulnerability can be exploited remotely by an authenticated domain user possessing low privileges. Attackers require network access and minimal setup, with no user interaction needed. Successful exploitation grants RCE on the affected backup hosts, enabling high-impact compromise of confidentiality, integrity, and availability across a changed scope.

Mitigation details are available in the official Veeam knowledge base article at https://www.veeam.com/kb4771.

Details

CWE(s)

Affected Products

veeam
veeam backup \& replication
12.0.0.1402 — 12.3.2.4165

CVEs Like This One

CVE-2026-21667Same product: Veeam Veeam Backup \& Replication
CVE-2026-21666Same product: Veeam Veeam Backup \& Replication
CVE-2026-21669Same product: Veeam Veeam Backup \& Replication
CVE-2025-48984Same product: Veeam Veeam Backup \& Replication
CVE-2025-59469Same product: Veeam Veeam Backup \& Replication
CVE-2025-55125Same product: Veeam Veeam Backup \& Replication
CVE-2025-59470Same product: Veeam Veeam Backup \& Replication
CVE-2026-21671Same product: Veeam Veeam Backup \& Replication
CVE-2025-59468Same product: Veeam Veeam Backup \& Replication
CVE-2025-23120Same product: Veeam Veeam Backup \& Replication

References