Your server have been found vulnerable to Veeam RCE.
This means any attacker can currently access your backup servers, execute code and download/modify/erase its content.
Patching is critical.
Reference : https://www.veeam.com/kb4288
Found Veeam distribution service, vulnerable to CVE-2022-26500, CVE-2022-26501 =================================================================== Log has been started by 'ARICKX-VBP01\SYSTEM' user (Non-interactive) Logging level: [4 (AboveNormal)] MachineName: [ARICKX-VBP01], OS: [Microsoft Windows Server 2016 Standard (10.0.14393)], CPU:  Process: [64 bit], PID: , SessionId:  UTC Time: [09-04-22 12:10:32], DaylightSavingTime: [True] Culture: [fr-BE], UI culture: [en-US] Module: [C:\Program Files\Veeam\Backup and Replication\Backup\Veeam.Backup.Service.exe]. File version: [22.214.171.1247], Assembly version: [126.96.36.199], Edition: [standard] Process start time: [18-11-21 10:48:14], Garbage collector mode: [Server] CmdLineParams:  Network Interface, Name: WAN, Description: vmxnet3 Ethernet Adapter, Interface Type: Ethernet, Operational Status: Up;