Ad

CVE-2024-40711

CRITICAL CVSS 3.1: 9.8
Updated Oct 30, 2025
Veeam
Parameter Value
CVSS 9.8 (CRITICAL)
Affected Versions 12.0.0.1420 — 12.2.0.334
Fixed In 12.2.0.334
Type CWE-502 (Deserialization of Untrusted Data)
Vendor Veeam
Public PoC Yes

A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 1

veeam:veeam_backup_\&_replication

Known Affected Software Configurations 1

Configuration From (including) Up to (excluding)
Veeam Veeam_Backup_\&_Replication
cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*
12.0.0.1420 12.2.0.334