CVE-2022-45450

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthorized users to access and manipulate sensitive information in Acronis products due to improper authorization checks. It affects Acronis Agent and Acronis Cyber Protect 15 installations on Linux, macOS, and Windows systems running vulnerable versions. Attackers can exploit this to view or modify protected data without proper authentication.

💻 Affected Systems

Products:
  • Acronis Agent
  • Acronis Cyber Protect 15
Versions: Acronis Agent before build 28610, Acronis Cyber Protect 15 before build 30984
Operating Systems: Linux, macOS, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of protected backup data including exfiltration, modification, or deletion of sensitive information, potentially leading to data loss, ransomware deployment, or compliance violations.

🟠

Likely Case

Unauthorized access to backup data and configuration information, allowing attackers to view sensitive files, modify backup settings, or disrupt backup operations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though the vulnerability still exists in the software itself.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the system but doesn't require administrative privileges. The vulnerability stems from improper authorization checks rather than authentication bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Agent build 28610 or later, Acronis Cyber Protect 15 build 30984 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-2410

Restart Required: Yes

Instructions:

1. Download the latest version from Acronis official sources. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the Acronis service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Acronis management interfaces to only trusted administrative systems.

Access Control Hardening

all

Implement strict file system permissions and limit user access to Acronis installation directories.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Acronis systems from untrusted networks
  • Enable detailed logging and monitoring for unauthorized access attempts to Acronis services

🔍 How to Verify

Check if Vulnerable:

Check the Acronis product version in the management console or via command line: On Windows: Check Programs and Features. On Linux/macOS: Check installed package version.

Check Version:

Windows: Check via Acronis Management Console. Linux: rpm -qa | grep acronis or dpkg -l | grep acronis. macOS: Check via Acronis application About menu.

Verify Fix Applied:

Verify the build number is 28610 or higher for Acronis Agent, or 30984 or higher for Acronis Cyber Protect 15.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Acronis services
  • Unexpected configuration changes in Acronis logs
  • Access to backup data from unauthorized accounts

Network Indicators:

  • Unusual network traffic to Acronis management ports (default 9876)
  • Connection attempts from unauthorized IP addresses

SIEM Query:

source="acronis*" AND (event_type="access_denied" OR event_type="unauthorized_access" OR user NOT IN ["authorized_users_list"])

🔗 References

📤 Share & Export