Home Veeam CVE-2025-48983
Back to Veeam

CVE-2025-48983

Veeam Backup & Replication - Mount service

Veeam CVSS 9.9 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in the Mount service of Veeam Backup & Replication allows for remote code execution (RCE) on the Backup infrastructure hosts by an authenticated domain user. This vulnerability can be exploited to gain unauthorized access to sensitive data and disrupt backup operations."

Anticipated Attack Path

  1. 1. Initial exploitation of the Mount service vulnerability
  2. 2. Gaining access to the Backup infrastructure hosts
  3. 3. Lateral movement and potential data exfiltration

Am I Vulnerable?

  • Verify the version of Veeam Backup & Replication
  • Check for any suspicious activity on the Backup infrastructure hosts
  • Apply the patch or workaround recommended by Veeam

Operational Audit Arsenal

Target Type Windows Service
Target Asset VeeamMountService
Standard Path C:\Program Files\Veeam\Backup and Replication\MountService.exe

Manual Verification Required

This is a non-Windows asset (Veeam). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to backup operations during patch application

Internal Work Notes

Veeam Backup & Replication Mount service vulnerability (CVE-2025-48983) - apply patch or workaround to prevent remote code execution

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Veeam Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.