{"uuid": "791907b8-6490-480d-947c-e9ba30780982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23120", "type": "seen", "source": "https://t.me/CyberBulletin/2727", "content": "\u26a1Two major vendors just patched remote code execution flaws\u2014update NOW before attackers exploit them.\n\nVeeam Backup (CVE-2025-23120, 9.9/10)\nAffects v12.3.0.310 &amp; earlier\nAllows RCE by authenticated users\nFixed in v12.3.1 (12.3.1.1139)\n\nIBM AIX (CVE-2024-56346 &amp; CVE-2024-56347, 10/10 &amp; 9.6/10)\nAffects AIX 7.2 &amp; 7.3\nExploitable via NIM services\n\n\u26a0\ufe0f No attacks seen yet, but don\u2019t wait\u2014patch immediately.\n\n#CyberBulletin", "creation_timestamp": "2025-03-21T06:44:57.000000Z"}