CVE-2021-34800

7.5 HIGH

📋 TL;DR

Acronis Agent versions before build 27147 on Windows, Linux, and macOS can log sensitive information to system logs. This vulnerability allows attackers with access to log files to potentially obtain credentials or other confidential data. All organizations using affected Acronis Agent versions are at risk.

💻 Affected Systems

Products:
  • Acronis Agent
Versions: All versions before build 27147
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the logging mechanism itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to administrative credentials or encryption keys from logs, leading to full system compromise and data exfiltration.

🟠

Likely Case

Unauthorized users with log access obtain sensitive configuration details or limited credentials, enabling further reconnaissance or privilege escalation.

🟢

If Mitigated

With proper log access controls and monitoring, impact is limited to information disclosure without direct system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to log files, which typically means some level of system access is already obtained. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 27147 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-3145

Restart Required: Yes

Instructions:

1. Download Acronis Agent build 27147 or later from official Acronis sources. 2. Install the update following standard procedures. 3. Restart the Acronis Agent service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Log File Access

all

Set strict file permissions on Acronis Agent log directories to prevent unauthorized access.

chmod 600 /var/log/acronis/* (Linux/macOS)
icacls "C:\ProgramData\Acronis\Logs" /deny "Users:(R,W)" (Windows)

Disable Detailed Logging

all

Configure Acronis Agent to use minimal logging that excludes sensitive information.

Edit configuration file to set log_level=ERROR or WARNING

🧯 If You Can't Patch

  • Implement strict access controls on log directories and files
  • Monitor log files for unauthorized access attempts and review existing logs for exposed sensitive data

🔍 How to Verify

Check if Vulnerable:

Check Acronis Agent version: On Windows - Check Programs and Features; On Linux/macOS - Run 'acronis_agent --version' or check installed package version.

Check Version:

acronis_agent --version (Linux/macOS) or check installed version in Control Panel (Windows)

Verify Fix Applied:

Confirm version is 27147 or later and test that sensitive information no longer appears in logs during normal operations.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Acronis log files
  • Log entries containing credentials or sensitive configuration data

Network Indicators:

  • Unusual outbound connections from systems running Acronis Agent

SIEM Query:

source="acronis_logs" AND (event_type="access_denied" OR keywords="password","secret","key")

🔗 References

📤 Share & Export