CVE-2023-44206

9.1 CRITICAL

📋 TL;DR

CVE-2023-44206 is an authorization bypass vulnerability in Acronis Cyber Protect 15 that allows attackers to access and manipulate sensitive information without proper authentication. This affects all Acronis Cyber Protect 15 installations on Linux and Windows systems before build 35979. The vulnerability stems from improper authorization checks in the application's access control mechanisms.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 15
Versions: All versions before build 35979
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability affects both management console and backup agent components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of backup data including ability to exfiltrate, modify, or delete sensitive backup archives, potentially leading to data destruction, ransomware deployment, or credential theft from backup contents.

🟠

Likely Case

Unauthorized access to backup data allowing attackers to read sensitive information, modify backup integrity, or disrupt backup operations.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and regular security monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows bypassing authorization without authentication, making exploitation straightforward once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 35979 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-5839

Restart Required: Yes

Instructions:

1. Download Acronis Cyber Protect 15 build 35979 or later from official Acronis portal. 2. Backup current configuration. 3. Install the update following Acronis documentation. 4. Restart all Acronis services. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Acronis management interfaces to trusted IP addresses only

# Use firewall rules to restrict access to Acronis ports (default 9876, 443)

Access Control Hardening

all

Implement additional authentication layers and monitor for unauthorized access attempts

# Configure additional authentication mechanisms if available

🧯 If You Can't Patch

  • Isolate Acronis systems from internet and restrict internal network access to only necessary administrative workstations
  • Implement strict monitoring and alerting for any unauthorized access attempts to Acronis management interfaces

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect version in management console or via command line: On Windows: Check program version in Control Panel > Programs. On Linux: Check installed package version.

Check Version:

Windows: wmic product where name="Acronis Cyber Protect" get version. Linux: rpm -qa | grep acronis or dpkg -l | grep acronis

Verify Fix Applied:

Verify build number is 35979 or higher in Acronis management console under Help > About or via version check commands.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Acronis management interfaces
  • Unexpected backup modifications or access patterns
  • Authentication bypass attempts in application logs

Network Indicators:

  • Unusual traffic to Acronis management ports (9876, 443) from unauthorized sources
  • Data exfiltration patterns from backup storage

SIEM Query:

source="acronis_logs" AND (event_type="auth_failure" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export