Ad

CVE-2024-40711

CRITICAL CVSS 3.1: 9.8 EPSS 68.2% ACTIVE EXPLOIT
Updated Oct 30, 2025
Veeam

CISA Known Exploited Vulnerability (KEV)

This vulnerability is actively exploited in the wild. Immediate patching is strongly recommended.

Due Date: Nov 07, 2024

Parameter Value
CVSS 9.8 (CRITICAL)
Affected Versions 12.0.0.1420 — 12.2.0.334
Fixed In 12.2.0.334
Type CWE-502 (Deserialization of Untrusted Data)
Vendor Veeam
Public PoC Yes

A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Veeam Veeam_Backup_\&_Replication
cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*
12.0.0.1420 12.2.0.334