CVE-2022-45458

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass certificate validation in Acronis products, potentially leading to man-in-the-middle attacks, sensitive information disclosure, and unauthorized data manipulation. It affects Acronis Agent and Acronis Cyber Protect 15 across Windows, macOS, and Linux platforms.

💻 Affected Systems

Products:
  • Acronis Agent
  • Acronis Cyber Protect 15
Versions: Acronis Agent before build 29633, Acronis Cyber Protect 15 before build 30984
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability exists in the certificate validation mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept and manipulate all communications between Acronis agents and management servers, steal credentials, deploy ransomware, or exfiltrate backup data.

🟠

Likely Case

Man-in-the-middle attacks leading to credential theft, backup data interception, or unauthorized access to managed systems.

🟢

If Mitigated

Limited impact if network segmentation, certificate pinning, or strict firewall rules prevent unauthorized network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access and ability to intercept communications. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Agent build 29633+, Acronis Cyber Protect 15 build 30984+

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-3952

Restart Required: Yes

Instructions:

1. Download latest version from Acronis portal. 2. Install update on all affected systems. 3. Restart Acronis services. 4. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Acronis management traffic to trusted networks only

Firewall Rules

all

Restrict network access to Acronis management ports (9876, 443) to trusted IPs only

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit attack surface
  • Monitor network traffic for unusual certificate validation failures or MITM indicators

🔍 How to Verify

Check if Vulnerable:

Check Acronis Agent version via GUI or command line: acronis_agent --version

Check Version:

acronis_agent --version

Verify Fix Applied:

Verify version is 29633+ for Agent or 30984+ for Cyber Protect 15

📡 Detection & Monitoring

Log Indicators:

  • Certificate validation failures
  • Unexpected certificate changes
  • Failed authentication attempts

Network Indicators:

  • Unusual traffic patterns on port 9876
  • MITM detection alerts
  • SSL/TLS certificate anomalies

SIEM Query:

source="acronis" AND (event="certificate_failure" OR event="auth_failed")

🔗 References

📤 Share & Export