CVE-2022-30993

7.5 HIGH

📋 TL;DR

CVE-2022-30993 allows attackers to intercept sensitive information transmitted in cleartext between Acronis Cyber Protect components. This affects Acronis Cyber Protect 15 installations on Linux and Windows systems before build 29240, potentially exposing credentials, backup data, or configuration details.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 15
Versions: All versions before build 29240
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects communication between Acronis Cyber Protect components (agent, management server, storage nodes). All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept administrative credentials, backup encryption keys, or sensitive customer data, leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Attackers on the same network segment capture authentication tokens or configuration data, enabling unauthorized access to backup systems or privilege escalation.

🟢

If Mitigated

With proper network segmentation and encryption controls, impact is limited to internal network reconnaissance with no sensitive data exposure.

🌐 Internet-Facing: MEDIUM - While the vulnerability itself doesn't directly expose services to the internet, internet-facing management interfaces could be affected if network traffic is intercepted.
🏢 Internal Only: HIGH - Most exploitation would occur from internal network positions where attackers can sniff traffic between Acronis components.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to sniff traffic between Acronis components. No authentication needed to intercept cleartext transmissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 29240 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-2441

Restart Required: Yes

Instructions:

1. Download Acronis Cyber Protect 15 build 29240 or later from official Acronis portal. 2. Backup current configuration. 3. Install update on all affected systems (agents and management servers). 4. Restart Acronis services. 5. Verify all components are communicating properly.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Acronis Cyber Protect traffic to dedicated VLANs or network segments

VPN/Encryption Tunnel

all

Force all Acronis component communication through encrypted VPN tunnels

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Acronis traffic from untrusted networks
  • Deploy network monitoring and IDS/IPS to detect cleartext credential transmission

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect version: On Windows - Check Control Panel > Programs > Acronis Cyber Protect. On Linux - Run 'rpm -qa | grep acronis' or 'dpkg -l | grep acronis'. If version is earlier than build 29240, system is vulnerable.

Check Version:

Windows: Check installed programs list. Linux: 'acronis_cyber_protect_console --version' or check package manager.

Verify Fix Applied:

Verify version is 29240 or later and test component communication to ensure encrypted transmission is functioning.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts from unexpected IPs
  • Unusual connection patterns between Acronis components

Network Indicators:

  • Cleartext HTTP traffic between Acronis components on non-standard ports
  • Unencrypted authentication strings in packet captures

SIEM Query:

source="acronis*" AND (event_type="authentication" OR event_type="connection") AND dest_ip!=expected_ip

🔗 References

📤 Share & Export