CVE-2023-44158

7.5 HIGH

📋 TL;DR

Acronis Cyber Protect 15 versions before build 35979 insufficiently mask token fields, potentially exposing sensitive authentication or session tokens. This affects all users of Acronis Cyber Protect 15 on both Linux and Windows platforms. Attackers could leverage exposed tokens to gain unauthorized access to protected systems or data.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 15
Versions: All versions before build 35979
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of protected systems and data through token reuse, leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Unauthorized access to backup data, configuration information, or limited system access depending on token privileges.

🟢

If Mitigated

Minimal impact with proper network segmentation, monitoring, and quick patch deployment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to token data, which may be obtained through logs, error messages, or network interception.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 35979 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-4071

Restart Required: Yes

Instructions:

1. Download Acronis Cyber Protect 15 build 35979 or later from official Acronis sources. 2. Install the update following Acronis documentation. 3. Restart the Acronis Cyber Protect service or the entire system as required.

🔧 Temporary Workarounds

Restrict Access to Logs and Interfaces

all

Limit access to Acronis management interfaces and log files to authorized personnel only.

Network Segmentation

all

Isolate Acronis Cyber Protect systems from untrusted networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Monitor logs for unusual token exposure or unauthorized access attempts.
  • Implement strict access controls and review all authentication mechanisms.

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Cyber Protect version in the management console or via command line. If version is earlier than build 35979, the system is vulnerable.

Check Version:

On Windows: Check via Acronis Management Console. On Linux: Check via acronis_cyber_protect --version or consult installation logs.

Verify Fix Applied:

Confirm the version shows build 35979 or later in the management interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual token strings in logs
  • Multiple failed authentication attempts followed by successful access
  • Access from unexpected IP addresses

Network Indicators:

  • Unusual traffic patterns to/from Acronis management ports
  • Token strings in cleartext network traffic

SIEM Query:

source="acronis_logs" AND (token OR authentication) AND (exposed OR cleartext)

🔗 References

📤 Share & Export