Hello experts,
I just wanted to check whether the Veeam OpenSSL3 FIPS Provider that ships with the most recent versions of Veeam Backup & Replication and Veeam Agent for Microsoft Windows is affected by the vulnerability CVE-2026-2673.
Thanks!
Massimiliano
-
massimiliano.rizzi
- Service Provider
- Posts: 241
- Liked: 34 times
- Joined: Jan 24, 2012 7:56 am
- Full Name: Massimiliano Rizzi
- Contact:
-
Mildur
- Product Manager
- Posts: 11650
- Liked: 3277 times
- Joined: May 13, 2017 4:51 pm
- Full Name: Fabian K.
- Location: Switzerland
- Contact:
Re: Is Veeam OpenSSL3 FIPS Provider affected by CVE CVE-2026-2673 ?
Hi Massimiliano,
A quick review of the provided CVE confirms that only OpenSSL 3.6 and 3.5 are affected.
According to our Open Source Software list, we don’t use either of those versions; we use OpenSSL 3.0, which is explicitly listed as not affected. The same source also states that OpenSSL FIPS modules are not affected.
Do you have any information that suggests otherwise?
Source: https://www.cve.org/CVERecord?id=CVE-2026-2673
https://www.veeam.com/legal/eula-oss.ht ... version=13

Best,
Fabian
A quick review of the provided CVE confirms that only OpenSSL 3.6 and 3.5 are affected.
According to our Open Source Software list, we don’t use either of those versions; we use OpenSSL 3.0, which is explicitly listed as not affected. The same source also states that OpenSSL FIPS modules are not affected.
Do you have any information that suggests otherwise?
Source: https://www.cve.org/CVERecord?id=CVE-2026-2673
Our Open Source Software list:No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary. OpenSSL 3.6 and 3.5 are vulnerable to this issue. OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released. OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released. OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.
https://www.veeam.com/legal/eula-oss.ht ... version=13

Best,
Fabian
Product Management Analyst @ Veeam Software
Who is online
Users browsing this forum: Amazon [Bot], d.artzen, Google [Bot], MrSpock, Samuraj, Semrush [Bot] and 55 guests