Rockwell Automation Lifecycle Services with Veeam Backup and Replication
A deserialization vulnerability (CWE-502) in Rockwell Automation Industrial Data Center (Generations 1–5) and VersaVirtual Appliance (Series A–C) when integrated with Veeam Backup and Replication allows an attacker with administrative privileges to execute arbitrary code on the appliance. The affected products are end-of-life; Rockwell Automation will not release patches. Customers with Infrastructure Managed Service contracts should contact Rockwell for remediation guidance. Others should apply Veeam's security updates (CVE-2025-23120).
- Administrative credentials to the Industrial Data Center or VersaVirtual Appliance
- Network access to the management interface (web portal or API endpoint)
- The affected Rockwell/Veeam appliance must be reachable from the attacker's network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/235d5fc7-579a-4256-bc77-4f3882e86212Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.