diff --git a/docs/advisories/20240909001-Veeam-Releases-Critical-Updates.md b/docs/advisories/20240909001-Veeam-Releases-Critical-Updates.md
new file mode 100644
index 00000000..2874080b
--- /dev/null
+++ b/docs/advisories/20240909001-Veeam-Releases-Critical-Updates.md
@@ -0,0 +1,26 @@
+# Veeam Releases Critical Updates - 20240909001
+
+## Overview
+
+Veeam has released a security advisory detailing multiple vulnerabilities affecting Veeam ONE, a comprehensive monitoring solution for virtual and data protection environments. These vulnerabilities exposes systems to remote code execution (RCE), credential theft, and configuration tampering.
+
+## What is vulnerable?
+
+| Product(s) Affected | Version(s) | CVE # | CVSS v4/v3 | Severity |
+| -------------------------- | -------------- | --------------------------------------------------------------------------------------------------------------------------------------- | ------------- | ---------------------- |
+| Veeam Backup & Replication | \< 12.2.0.334 | [CVE-2024-40711](https://nvd.nist.gov/vuln/detail/CVE-2024-40711) | 9.8 | Critical |
+| Veeam ONE | \< 12.2.0.4093 | [CVE-2024-42024](https://nvd.nist.gov/vuln/detail/CVE-2024-42024)
[CVE-2024-42019](https://nvd.nist.gov/vuln/detail/CVE-2024-42019) | 9.1
9.0 | Critical
Critical |
+
+## What has been observed?
+
+There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
+
+## Recommendation
+
+The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):
+
+- Veeam Security Advisory:
+
+## Additional References
+
+- SecurtyNewsOnline article: