CVE-2023-44208

9.1 CRITICAL

📋 TL;DR

This vulnerability in Acronis Cyber Protect Home Office for Windows allows unauthorized users to access and manipulate sensitive information due to missing authorization checks. It affects Windows users running versions before build 40713. Attackers could potentially read or modify protected data without proper credentials.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Home Office
Versions: All versions before build 40713
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Acronis Cyber Protect Home Office. Other Acronis products and platforms are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all protected backup data including personal files, system images, and credentials stored by Acronis Cyber Protect Home Office.

🟠

Likely Case

Unauthorized access to sensitive backup files and system information stored by the application.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized users from reaching the vulnerable service.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires local access, remote exploitation is possible if the service is exposed to the network.
🏢 Internal Only: HIGH - Local attackers or malware on the system can exploit this vulnerability to access sensitive backup data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves missing authorization checks, making exploitation straightforward once an attacker gains access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 40713 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-6587

Restart Required: Yes

Instructions:

1. Open Acronis Cyber Protect Home Office. 2. Check for updates in the application settings. 3. Install update to build 40713 or later. 4. Restart the computer to complete the installation.

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to Acronis Cyber Protect Home Office service to prevent remote exploitation

Use Windows Firewall to block inbound connections to Acronis services on non-essential ports

Disable Unnecessary Features

windows

Disable network sharing and remote management features if not required

Navigate to Acronis settings > Network and disable 'Allow remote connections' if enabled

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access the system running Acronis Cyber Protect Home Office
  • Monitor for suspicious access attempts to Acronis services and review access logs regularly

🔍 How to Verify

Check if Vulnerable:

Open Acronis Cyber Protect Home Office, go to Help > About and check if build number is lower than 40713

Check Version:

Check Acronis Cyber Protect Home Office version in Help > About menu

Verify Fix Applied:

After updating, verify the build number is 40713 or higher in Help > About

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Acronis services
  • Unexpected file access patterns in backup directories

Network Indicators:

  • Unusual network traffic to Acronis service ports from unauthorized sources

SIEM Query:

source="acronis" AND (event_type="access_denied" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export