Wednesday, April 2, 2025
HomeCyber Security NewsWindows 11 24H2 Update Disrupts Connection to Veeam Backup Server

Windows 11 24H2 Update Disrupts Connection to Veeam Backup Server

Published on

SIEM as a Service

Follow Us on Google News

Users of the Veeam Backup Server have encountered a significant issue following the Windows 11 24H2 update.

Specifically, the update has disrupted the connection between Veeam Recovery Media and the Veeam Backup Server.

This problem affects users who have created recovery media from Windows 11 version 24H2 (build 26100.3194) or higher.

When attempting to restore systems using Veeam Recovery Media created from the latest Windows 11 build, users are met with a series of connection-related errors. These errors include messages such as:

  • Connection problems
  • The exception has been thrown by the target of an invocation
  • Failed to establish connection: no valid IP addresses were found
  • Unable to establish authenticated client-server connection
  • A call to SSPI failed; see inner exception
  • The Local Security Authority cannot be contacted
  • Error 1: The remote procedure call failed and did not execute
  • Error 2

Cause of the Issue

The underlying cause of these connection failures remains unknown at this time. However, it is believed to be associated with a change introduced in the Windows 11 24H2 February update, specifically KB5051987.

The remote procedure call failed and did not execute
The remote procedure call failed and did not execute

Both Veeam and Microsoft are actively investigating this issue to determine the root cause and find a permanent solution.

Until a definitive fix is available, Veeam recommends that affected customers use recovery media generated from older versions of Windows 11, specifically build 26100.3037 or lower.

This workaround should allow users to restore their systems successfully without encountering the connection issues caused by the 24H2 update.

This disruption has significant implications for businesses and individuals relying on Veeam for backup and recovery.

Users are advised to remain vigilant and monitor updates from both Veeam and Microsoft for further guidance on resolving this issue.

It is also crucial for IT professionals to plan by using compatible recovery media until the problem is fully addressed.

While the Windows 11 24H2 update has introduced important features and security enhancements, its impact on Veeam Backup Server connections cannot be overlooked.

Users must be prepared to adapt their recovery strategies temporarily until a comprehensive solution is developed.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time

A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective...

Hackers Exploit JavaScript & CSS Tricks to Steal Browsing History

The web browsing history feature, designed to enhance user convenience by styling visited links...

Python Introduces New Standard Lock File Format for Enhanced Security

The Python Software Foundation (PSF) has officially announced the adoption of a new standardized...

Hackers Exploit Microsoft Teams Messages to Deliver Malware

Cybersecurity experts have uncovered a new malware campaign targeting Microsoft Teams users to infiltrate...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time

A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective...

Hackers Exploit JavaScript & CSS Tricks to Steal Browsing History

The web browsing history feature, designed to enhance user convenience by styling visited links...

Python Introduces New Standard Lock File Format for Enhanced Security

The Python Software Foundation (PSF) has officially announced the adoption of a new standardized...