Veeam Intelligent Diagnostics (VID) is a feature that automatically detects known issues in the configuration and performance of backup infrastructure.
This thread will be used for tracking VID signature updates.
Follow this link to get information on how to update VID signatures.
Veeam Intelligent Diagnostics packages are cumulative and include previously released packages.
Previous updates: Veeam Intelligent Diagnostics updates (archive)
-
RomanK
- Veeam Software
- Posts: 857
- Liked: 232 times
- Joined: Nov 01, 2016 11:26 am
- Contact:
-
RomanK
- Veeam Software
- Posts: 857
- Liked: 232 times
- Joined: Nov 01, 2016 11:26 am
- Contact:
Veeam ONE Signatures Roll-up January 2026
Download link: Signatures v1.8.165
Compatibility: Veeam ONE 13.0.1, Veeam ONE 13.0
Veeam Backup & Replication 13.0.1 P1 (13.0.1.1071) is available
The release addresses four vulnerabilities and numerous additional issues.
Veeam ONE 13.0.1 P1 (13.0.1.6168) is available
The release brings several new features and improvements.
Compatibility: Veeam ONE 13.0.1, Veeam ONE 13.0
Veeam Backup & Replication 13.0.1 P1 (13.0.1.1071) is available
The release addresses four vulnerabilities and numerous additional issues.
Veeam ONE 13.0.1 P1 (13.0.1.6168) is available
The release brings several new features and improvements.
-
RomanK
- Veeam Software
- Posts: 857
- Liked: 232 times
- Joined: Nov 01, 2016 11:26 am
- Contact:
Veeam ONE Signatures Roll-up March 2026
Download link: Signatures v1.8.175
Compatibility: Veeam ONE 13.0.1, Veeam ONE 13.0
Veeam Backup & Replication 13.0.1 P2 (13.0.1.2067) is available
The Veeam Backup & Replication 13.0.1 P2 addresses the following security vulnerabilities:
Security vulnerability CVE-2026-21667 in Veeam Backup & Replication
Security vulnerability CVE-2026-21669 in Veeam Backup & Replication
These issues are caused by an authenticated domain user being able to perform remote code execution (RCE) on the Backup Server.
Security vulnerability CVE-2026-21671 in Veeam Backup & Replication
This issue is caused by an authenticated user with the Backup Administrator role being able to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.
Security vulnerability CVE-2026-21708 in Veeam Backup & Replication
This issue is caused by a Backup Viewer being able to perform remote code execution (RCE) as the postgres user.
Security vulnerability CVE-2026-21668 in Veeam Backup & Replication
This issue is caused by an authenticated domain user being able to bypass restrictions and manipulate arbitrary files on a Backup Repository.
Security vulnerability CVE-2026-21670 in Veeam Backup & Replication
This issue is caused by a low-privileged user being able to extract saved SSH credentials.
Security vulnerability CVE-2026-21672 in Veeam Backup & Replication
This issue is caused by local privilege escalation being possible on Windows-based Veeam Backup & Replication servers.
Restore to Azure Disk fails with 'Invalid Azure access tier string received'
Restore to Azure Disk fails with 'Invalid Azure access tier string received'
Editing jobs fails with 'Error while Resolving SID. Error number 1332' after configuration backup restore
The issue is caused by the user which created this specific job not being present on the current server.
Configuration Backup fails with 'Unsupported PostgreSQL type: character varying(255)'
The configuration backup logic does not handle the varchar(255) column type used in the 'backup.model.trustedaddomainauthoritycertificates' table.
Compatibility: Veeam ONE 13.0.1, Veeam ONE 13.0
Veeam Backup & Replication 13.0.1 P2 (13.0.1.2067) is available
The Veeam Backup & Replication 13.0.1 P2 addresses the following security vulnerabilities:
- CVE-2026-21669 - A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.</li>
- CVE-2026-21670 - A vulnerability allowing a low-privileged user to extract saved SSH credentials.</li>
- CVE-2026-21671 - A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.</li>
- CVE-2026-21672 - A vulnerability allowing local privilege escalation on Windows-based Veeam Backup & Replication servers.</li>
- CVE-2026-21708 - A vulnerability allowing a Backup Viewer to perform remote code execution (RCE) as the postgres user.</li>
Security vulnerability CVE-2026-21667 in Veeam Backup & Replication
Security vulnerability CVE-2026-21669 in Veeam Backup & Replication
These issues are caused by an authenticated domain user being able to perform remote code execution (RCE) on the Backup Server.
Security vulnerability CVE-2026-21671 in Veeam Backup & Replication
This issue is caused by an authenticated user with the Backup Administrator role being able to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.
Security vulnerability CVE-2026-21708 in Veeam Backup & Replication
This issue is caused by a Backup Viewer being able to perform remote code execution (RCE) as the postgres user.
Security vulnerability CVE-2026-21668 in Veeam Backup & Replication
This issue is caused by an authenticated domain user being able to bypass restrictions and manipulate arbitrary files on a Backup Repository.
Security vulnerability CVE-2026-21670 in Veeam Backup & Replication
This issue is caused by a low-privileged user being able to extract saved SSH credentials.
Security vulnerability CVE-2026-21672 in Veeam Backup & Replication
This issue is caused by local privilege escalation being possible on Windows-based Veeam Backup & Replication servers.
Restore to Azure Disk fails with 'Invalid Azure access tier string received'
Restore to Azure Disk fails with 'Invalid Azure access tier string received'
Editing jobs fails with 'Error while Resolving SID. Error number 1332' after configuration backup restore
The issue is caused by the user which created this specific job not being present on the current server.
Configuration Backup fails with 'Unsupported PostgreSQL type: character varying(255)'
The configuration backup logic does not handle the varchar(255) column type used in the 'backup.model.trustedaddomainauthoritycertificates' table.
Who is online
Users browsing this forum: Semrush [Bot] and 17 guests