CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
This update has been superseded by Veeam Backup & Replication 11a.
Please confirm that you are running V11 GA (build 11.0.0.837) of any earlier patch level prior to installing this update. You can check this underHelp | Aboutin the backup console. After upgrade, your build number will be11.0.0.837 P20210525.
This cumulative patch includes the following new features, enhancements and fixes for the original V11 GA builds:
P20210525
P20210507
Added VMware vSphere 7.0 U2 support including new vSphere API version awareness and virtual hardware version 19 compatibility. Note: CDP functionality is not yet supported with vSphere 7.0 U2 due to the I/O filter drivers signing infrastructure issue at VMware, support will be added in the next cumulative patch.
Added support for VMware Distributed Switch (VDS) version 7.0 in VMware NSX-T 3.0 or later environments for VM restore operations.
Archive Tier no longer requires minimum remaining storage time of at least 180 days for GFS backups offloaded to Amazon Glacier Deep Archive, as even when taking into account its early deletion fee, this storage class ends up being cheaper than Amazon Glacier regardless of the remaining storage time.
Various product functionality should no longer outright refuse to work with pre-release builds of Windows 10 21H1 and Windows Server 2022 builds and will instead attempt to process them using the existing logic created for previous OS versions. This change does not constitute the official support for these platforms, which is planned for version 11a.
Restoring a V10 configuration backup into a V11 backup server fails with the “Violation of PRIMARY KEY constraint ‘PK_Credentials.Onsite’. Cannot insert duplicate key in object ‘dbo.Credentials.Onsite’. The duplicate key value is (GUID)” error in upgrade logs for installations that had multiple Linux server with the same credentials registered at the time of Veeam Backup & Replication upgrade from version 6.5 to 7.0.
Jobs do not start according to the schedule, get stuck in the Stopping state, or demonstrate other abnormal behavior due to the Watchdog service thread terminating abnormally in certain circumstances and thus no longer killing job sessions which did not have a chance to finish properly due to some external event.
Backup from storage snapshots fails with the “Unknown plug-in: 00000000-0000-0000-0000-000000000000” error due to the presence of rows with NULL host_id value in the configuration database table. Such rows can appear if you previously removed and re-added your primary storage to Veeam.
VMware vCloud Director: vCD jobs may fail with the “VDDK error: 3 (One of the parameters was invalid)” error due to a conflict with the SkipCertificateCheck registry value; SQL Server transaction log backup jobs fail with the "Unable to cast object" error; vCD UI plug-in does not support deployments with more than 25 organizations.
User interface: poor remote backup console responsiveness over high latency links; bottleneck statistics for the proxy component always shows zero load; console fails to load plug-ins when started under account without Local Admininstrator privileges; vSphere tags combination can now be used for CDP policies as well; backup server patch level is now displayed next to the build number.
Self-service portals: SQL Server databases restore issue; job schedule settings changes not applying; incorrect tenant quota calculation.
Direct restore to Amazon EC2: restore fails with the "The request must contain the parameter size or snapshotId" errors due to some recent API changes on the AWS side; temporary S3 bucket is not removed automatically following the restore.
Object storage: ListBuckets API call is issued when registering an S3-compatible object storage repository even if a user does not browse for a bucket but rather specifies its name manually. This prevents bucket registration when the ListBuckets permission is missing from the account used to connect to the bucket.
RMAN plug-in: addressed a number of issues in corner cases caused by overlapping backup sessions.
Veeam Cloud Connect: various issues caused by attempting to reuse data movers which are unexpectedly no longer running; tenant backup copy jobs failures with the “Full point was not found” error during retention policy processing; licensing logic may start to impact VCC service availability if certain data set appears in the configuration database.
Addressed a vulnerability (CVE-2021-35971) in the deserialization logic of Microsoft .NET remoting. Veeam would like to thank Markus Wulftange from Code White for reporting the vulnerability and for his collaboration with the mitigation.
P20210401
P20210324
P20210319
This update has been superseded by Veeam Backup & Replication 11a.
If you have V11 GA build installed already, you can apply Cumulative Patch P20210525 using the following update package:
MD5: 40f5964796a73e19a430e0de35727327 SHA-1: bfe431adbcd88a584742b16dcfd0dd6d8832db09
For new installations and upgrades from the previous versions, use the V11 ISO version P20210525:
_
This update (v11) is not compatible with 10.0.1.4854 P20210609, upgrade to Veeam Backup & Replication 11a instead._
MD5: 769dba9a2f1654accf95f4a6c7f116b5 SHA-1: 1b2fa3bff775049670a5f02d927b0f77262deb90
Reboot may be required
Please note that a reboot may be required after installing the update.
Please plan accordingly.
To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.
Vendor | Product | Version | CPE |
---|---|---|---|
veeam | veeam_backup_\&_replication | 11 | cpe:2.3:a:veeam:veeam_backup_\&_replication:11:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High