Your server have been found vulnerable to Veeam RCE.
This means any attacker can currently access your backup servers, execute code and download/modify/erase its content.
Patching is critical.
Reference : https://www.veeam.com/kb4288
Found Veeam distribution service, vulnerable to CVE-2022-26500, CVE-2022-26501
===================================================================
Log has been started by 'ARICKX-VBP01\SYSTEM' user (Non-interactive)
Logging level: [4 (AboveNormal)]
MachineName: [ARICKX-VBP01], OS: [Microsoft Windows Server 2016 Standard (10.0.14393)], CPU: [6]
Process: [64 bit], PID: [7212], SessionId: [0]
UTC Time: [09-04-22 12:10:32], DaylightSavingTime: [True]
Culture: [fr-BE], UI culture: [en-US]
Module: [C:\Program Files\Veeam\Backup and Replication\Backup\Veeam.Backup.Service.exe]. File version: [11.0.0.837], Assembly version: [11.0.0.0], Edition: [standard]
Process start time: [18-11-21 10:48:14], Garbage collector mode: [Server]
CmdLineParams: []
Network Interface, Name: WAN, Description: vmxnet3 Ethernet Adapter, Interface Type: Ethernet, Operational Status: Up;