CVE-2023-41748

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on affected Acronis Cloud Manager installations due to improper input validation. Organizations using Acronis Cloud Manager (Windows) versions before build 6.2.23089.203 are affected, potentially enabling complete system compromise.

💻 Affected Systems

Products:
  • Acronis Cloud Manager
Versions: All versions before build 6.2.23089.203
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of Acronis Cloud Manager. Cloud Manager is typically deployed on-premises or in hybrid environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to data theft, installation of backdoors, or deployment of malware on affected systems.

🟢

If Mitigated

Limited impact through network segmentation and proper access controls, but still significant risk to the vulnerable system.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with network attack vector and no authentication required. The CWE-20 (Improper Input Validation) classification suggests straightforward exploitation once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 6.2.23089.203 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-5816

Restart Required: Yes

Instructions:

1. Download the latest version from Acronis support portal. 2. Backup current configuration. 3. Run the installer with administrative privileges. 4. Restart the Acronis Cloud Manager service or reboot the system.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Acronis Cloud Manager from untrusted networks and restrict access to trusted IP addresses only.

Firewall Rules

windows

Implement strict firewall rules to limit inbound connections to the Acronis Cloud Manager service.

New-NetFirewallRule -DisplayName "Block Acronis External" -Direction Inbound -Protocol TCP -LocalPort 80,443 -RemoteAddress Internet -Action Block

🧯 If You Can't Patch

  • Immediately isolate the vulnerable system from production networks and internet access.
  • Implement application whitelisting to prevent execution of unauthorized binaries and scripts.

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Cloud Manager version in the application interface or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\Cloud Manager\Version

Check Version:

reg query "HKLM\SOFTWARE\Acronis\Cloud Manager" /v Version

Verify Fix Applied:

Verify the version shows 6.2.23089.203 or higher and test that the application functions normally after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation events from Acronis Cloud Manager service
  • Suspicious command execution patterns in application logs
  • Failed authentication attempts followed by successful exploitation

Network Indicators:

  • Unexpected outbound connections from Acronis Cloud Manager system
  • Anomalous traffic patterns to/from Acronis service ports

SIEM Query:

source="acronis_logs" AND (event_type="process_creation" AND parent_process="acronis_service.exe") OR (event_type="network_connection" AND dest_port IN (80,443,8080) AND src_ip="acronis_server_ip")

🔗 References

📤 Share & Export