CVE-2023-44152

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication mechanisms in Acronis Cyber Protect 15, potentially leading to unauthorized access, sensitive information disclosure, and system manipulation. It affects all Acronis Cyber Protect 15 installations on Linux, macOS, and Windows systems before build 35979. The high CVSS score of 9.1 indicates critical severity.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 15
Versions: All versions before build 35979
Operating Systems: Linux, macOS, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability affects the management interface authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Acronis Cyber Protect system allowing attackers to access all protected data, modify backup configurations, delete backups, and potentially gain further access to connected systems.

🟠

Likely Case

Unauthorized access to backup data, configuration manipulation, and potential data exfiltration from the backup environment.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the management interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves improper authentication, suggesting relatively straightforward exploitation once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 35979 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-1908

Restart Required: Yes

Instructions:

1. Download the latest version from Acronis official sources. 2. Run the installer to update to build 35979 or later. 3. Restart the Acronis Cyber Protect service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to the Acronis Cyber Protect management interface to trusted IP addresses only.

Disable Remote Management

all

Temporarily disable remote management capabilities if not required for operations.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of the management interface
  • Enable detailed logging and monitoring for authentication attempts and configuration changes

🔍 How to Verify

Check if Vulnerable:

Check the build number in Acronis Cyber Protect console or installation directory. If build number is lower than 35979, the system is vulnerable.

Check Version:

Check the About section in Acronis Cyber Protect console or examine the installation directory for version information.

Verify Fix Applied:

Verify the build number shows 35979 or higher after patching and test authentication mechanisms.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Unauthorized configuration changes
  • Access from unexpected IP addresses

Network Indicators:

  • Unusual traffic patterns to the management port
  • Authentication bypass attempts

SIEM Query:

source="acronis_logs" AND (event_type="auth_failure" OR event_type="config_change")

🔗 References

📤 Share & Export