Comprehensive data protection for all workloads
Post Reply
skate88
Influencer
Posts: 21
Liked: never
Joined: Jan 25, 2011 8:05 am
Contact:

CVE-2025-23120 - request for veeam comment

Post by skate88 »

as we only have the one liner
"A vulnerability allowing remote code execution (RCE) by authenticated domain users."
to go on and a link to the home page of watchtowr.com its worth reading the below link

https://labs.watchtowr.com/by-executive ... 025-23120/

anyone from veeam prepared to comment on this article ?
Gostev
Chief Product Officer
Posts: 32222
Liked: 7586 times
Joined: Jan 01, 2006 1:01 am
Location: Baar, Switzerland
Contact:

Re: CVE-2025-23120 - request for veeam comment

Post by Gostev » 11 people like this post

For the context - someone told me a while back that Watchtowr made its name on and been specializing on BinaryFormatter vulnerabilities - in a sense that they find all software using this Microsoft technology and dig it for vulnerabilities. They are like bees and BinaryFormatter is their honey!

It's true there's no ultimate, final fix for BinaryFormatter related vulnerabilities. Nevertheless, Veeam's exclusions list is actually pretty close to "perfect" in their own terms because our security team has been putting a lot of focus on this known attack vector in the past few years, so there's much scrutiny applied to exclusions. And so has been Watchtowr themselves, for which we're very thankful, who by the way were the first to bring us the first related vulnerability some years ago; as well as many other external researchers. And all of them were not able to find nearly as many omissions as the FUD in the article implies to exist.

Still, the exclusion list is hard to make perfect, so these will keep dripping occasionally. And because we do want our software to be perfect, we're no longer using BinaryFormatter in V13, thus closing a chapter on this whole class of vulnerabilities.
skate88
Influencer
Posts: 21
Liked: never
Joined: Jan 25, 2011 8:05 am
Contact:

Re: CVE-2025-23120 - request for veeam comment

Post by skate88 »

thanks very much for the prompt answer !

kind regards
neil
mikeely
Expert
Posts: 241
Liked: 72 times
Joined: Nov 07, 2016 7:39 pm
Full Name: Mike Ely
Contact:

Re: CVE-2025-23120 - request for veeam comment

Post by mikeely »

Gostev wrote: Mar 20, 2025 10:27 am It's true there's no ultimate, final fix for BinaryFormatter related vulnerabilities. Nevertheless, Veeam's exclusions list is actually pretty close to "perfect"
Is there any reason not to move to an inclusions list rather than an exclusions list?
Gostev wrote: Mar 20, 2025 10:27 am Still, because the exclusion list is hard to make perfect, and we do want our software to be perfect, we're no longer using BinaryFormatter in V13, thus closing a chapter on this whole class of vulnerabilities.
This is rad, speaking just from my own perspective I really appreciate it.
'If you truly love Veeam, then you should not let us do this :D' --Gostev, in a particularly Blazing Saddles moment
Gostev
Chief Product Officer
Posts: 32222
Liked: 7586 times
Joined: Jan 01, 2006 1:01 am
Location: Baar, Switzerland
Contact:

Re: CVE-2025-23120 - request for veeam comment

Post by Gostev » 1 person likes this post

As our AppSec engineers explained me that both this change and just removing BinaryFormatter deserialization mechanism completely are very impactful and require comparable heavy lifting to implement and test all affected areas for regressions, thus requiring a major release to implement. However, the latter path gets our product to a much better place overall and provides the permanent solution, which is why we chose this route for V13.
Post Reply

Who is online

Users browsing this forum: Baidu [Spider], Bing [Bot], gtelnet and 161 guests