CVE-2023-41742

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to exploit Acronis Agent and Acronis Cyber Protect 15 by binding to unrestricted IP addresses, creating an excessive attack surface. Affected systems include Acronis Agent (Linux, macOS, Windows) before build 30430 and Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.

💻 Affected Systems

Products:
  • Acronis Agent
  • Acronis Cyber Protect 15
Versions: Acronis Agent before build 30430, Acronis Cyber Protect 15 before build 35979
Operating Systems: Linux, macOS, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise and lateral movement across the network

🟠

Likely Case

Unauthorized access to sensitive data and potential privilege escalation

🟢

If Mitigated

Limited impact with proper network segmentation and access controls

🌐 Internet-Facing: HIGH - Systems exposed to internet are directly vulnerable to remote attacks
🏢 Internal Only: MEDIUM - Internal systems still vulnerable to insider threats or compromised internal hosts

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves binding to unrestricted IP addresses, making exploitation relatively straightforward for attackers with network access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Agent build 30430+, Acronis Cyber Protect 15 build 35979+

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-4351

Restart Required: Yes

Instructions:

1. Download latest version from Acronis portal 2. Install update 3. Restart affected services 4. Verify successful update

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict network access to Acronis services using firewall rules

iptables -A INPUT -p tcp --dport [Acronis_port] -s [trusted_network] -j ACCEPT
iptables -A INPUT -p tcp --dport [Acronis_port] -j DROP

Windows Firewall Restriction

windows

Limit Acronis service ports to trusted networks only

New-NetFirewallRule -DisplayName "Block Acronis External" -Direction Inbound -Protocol TCP -LocalPort [Acronis_port] -RemoteAddress NotLocalSubnet -Action Block

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Acronis services
  • Monitor network traffic to/from Acronis services for suspicious activity and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Acronis Agent version: acronis_agent --version or check installed build number in Acronis Cyber Protect console

Check Version:

acronis_agent --version (Linux/macOS) or check Programs and Features (Windows)

Verify Fix Applied:

Verify version is 30430+ for Agent or 35979+ for Cyber Protect 15, and confirm services are not binding to unrestricted addresses

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to Acronis services
  • Failed authentication attempts to Acronis ports
  • Unexpected process execution from Acronis binaries

Network Indicators:

  • Unusual traffic patterns to Acronis service ports
  • Connection attempts from unauthorized IP ranges
  • Port scanning activity targeting Acronis ports

SIEM Query:

source="acronis_logs" AND (event_type="connection" AND src_ip NOT IN [trusted_networks]) OR (event_type="authentication_failure")

🔗 References

📤 Share & Export