CVE-2023-41746

9.8 CRITICAL

📋 TL;DR

CVE-2023-41746 is a critical remote command execution vulnerability in Acronis Cloud Manager for Windows due to improper input validation. Attackers can execute arbitrary commands on affected systems without authentication. Organizations running Acronis Cloud Manager (Windows) versions before build 6.2.23089.203 are affected.

💻 Affected Systems

Products:
  • Acronis Cloud Manager (Windows)
Versions: All versions before build 6.2.23089.203
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only Windows versions of Acronis Cloud Manager are affected. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with high privileges, potentially leading to data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Remote attackers gaining initial foothold on the Acronis Cloud Manager server, enabling further reconnaissance, credential harvesting, and deployment of additional payloads.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting the isolated Acronis management environment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has low attack complexity according to CVSS scoring. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 6.2.23089.203 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-5810

Restart Required: Yes

Instructions:

1. Download the latest version from Acronis official sources. 2. Backup current configuration. 3. Install the update following Acronis documentation. 4. Restart the Acronis Cloud Manager service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Acronis Cloud Manager to only trusted management networks

Firewall Rules

all

Implement strict firewall rules to limit inbound connections to the Acronis Cloud Manager interface

🧯 If You Can't Patch

  • Isolate the Acronis Cloud Manager server from internet access and restrict internal network access to only necessary administrative systems
  • Implement application-level firewall or WAF rules to filter suspicious input patterns targeting the vulnerable component

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Cloud Manager version in the administration interface or via the installed program details in Windows

Check Version:

Check via Acronis Cloud Manager web interface or Windows Programs and Features

Verify Fix Applied:

Verify the version is 6.2.23089.203 or later and test that the vulnerable functionality no longer accepts malicious input

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution events in Acronis logs
  • Suspicious process creation from Acronis services
  • Authentication bypass attempts

Network Indicators:

  • Unexpected outbound connections from Acronis Cloud Manager server
  • Suspicious payloads in HTTP requests to Acronis management interface

SIEM Query:

source="acronis" AND (event_type="command_execution" OR process_name="cmd.exe" OR process_name="powershell.exe")

🔗 References

📤 Share & Export