CVE-2023-44152
📋 TL;DR
This vulnerability allows attackers to bypass authentication mechanisms in Acronis Cyber Protect 15, potentially leading to unauthorized access, sensitive information disclosure, and system manipulation. It affects all Acronis Cyber Protect 15 installations on Linux, macOS, and Windows systems before build 35979. The high CVSS score of 9.1 indicates critical severity.
💻 Affected Systems
- Acronis Cyber Protect 15
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the Acronis Cyber Protect system allowing attackers to access all protected data, modify backup configurations, delete backups, and potentially gain further access to connected systems.
Likely Case
Unauthorized access to backup data, configuration manipulation, and potential data exfiltration from the backup environment.
If Mitigated
Limited impact if proper network segmentation and access controls prevent external access to the management interface.
🎯 Exploit Status
The vulnerability involves improper authentication, suggesting relatively straightforward exploitation once the attack vector is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Build 35979 or later
Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-1908
Restart Required: Yes
Instructions:
1. Download the latest version from Acronis official sources. 2. Run the installer to update to build 35979 or later. 3. Restart the Acronis Cyber Protect service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Network Isolation
allRestrict network access to the Acronis Cyber Protect management interface to trusted IP addresses only.
Disable Remote Management
allTemporarily disable remote management capabilities if not required for operations.
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure of the management interface
- Enable detailed logging and monitoring for authentication attempts and configuration changes
🔍 How to Verify
Check if Vulnerable:
Check the build number in Acronis Cyber Protect console or installation directory. If build number is lower than 35979, the system is vulnerable.
Check Version:
Check the About section in Acronis Cyber Protect console or examine the installation directory for version information.
Verify Fix Applied:
Verify the build number shows 35979 or higher after patching and test authentication mechanisms.
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts followed by successful access
- Unauthorized configuration changes
- Access from unexpected IP addresses
Network Indicators:
- Unusual traffic patterns to the management port
- Authentication bypass attempts
SIEM Query:
source="acronis_logs" AND (event_type="auth_failure" OR event_type="config_change")