CVE-2022-45453

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to perform man-in-the-middle attacks by exploiting weak TLS/SSL cipher suites in Acronis Cyber Protect 15. Affected systems include Windows and Linux versions before build 30984, potentially exposing sensitive data in transit.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 15
Versions: All versions before build 30984
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both agent and management server components when using vulnerable cipher suites.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete interception and decryption of all encrypted communications between Acronis Cyber Protect components, leading to data theft, credential compromise, and potential lateral movement.

🟠

Likely Case

Partial decryption of sensitive administrative or backup data during man-in-the-middle attacks, potentially exposing credentials or confidential information.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though weak ciphers still present theoretical risk.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exposed to man-in-the-middle attacks from external attackers.
🏢 Internal Only: MEDIUM - Internal systems still vulnerable to insider threats or compromised internal hosts performing man-in-the-middle attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires man-in-the-middle position but uses well-known cryptographic attacks against weak ciphers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 30984 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-5112

Restart Required: Yes

Instructions:

1. Update Acronis Cyber Protect 15 to build 30984 or later. 2. Restart all Acronis services. 3. Verify cipher suite configuration post-update.

🔧 Temporary Workarounds

Disable Weak Cipher Suites

all

Manually disable weak TLS/SSL cipher suites in Acronis configuration

# Configuration varies by platform - consult Acronis documentation for cipher suite configuration

Network Segmentation

all

Isolate Acronis traffic to trusted network segments

# Use firewall rules to restrict Acronis traffic to specific subnets

🧯 If You Can't Patch

  • Implement strict network segmentation to limit attack surface
  • Deploy network monitoring for SSL/TLS downgrade attacks and unusual traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect version via management console or command 'acronis_cyber_protect --version' and verify if below build 30984

Check Version:

acronis_cyber_protect --version

Verify Fix Applied:

Verify version is 30984+ and test SSL/TLS connections using tools like nmap or openssl to confirm weak ciphers are disabled

📡 Detection & Monitoring

Log Indicators:

  • SSL/TLS handshake failures
  • Unusual cipher suite negotiations
  • Connection resets during SSL/TLS setup

Network Indicators:

  • SSL/TLS downgrade attempts
  • Use of weak cipher suites (RC4, DES, EXPORT, NULL, anon)
  • Unusual man-in-the-middle patterns

SIEM Query:

ssl.cipher_suite IN ("TLS_RSA_WITH_RC4_128_MD5", "TLS_RSA_WITH_RC4_128_SHA", "TLS_RSA_WITH_DES_CBC_SHA") AND dest_ip IN (acronis_servers)

🔗 References

📤 Share & Export