CVE-2023-44211

7.1 HIGH

📋 TL;DR

This vulnerability allows unauthorized users to access and manipulate sensitive information in Acronis Cyber Protect products due to missing authorization checks. It affects Acronis Cyber Protect Cloud Agent and Acronis Cyber Protect 16 installations. Attackers could potentially read or modify protected data without proper credentials.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Cloud Agent
  • Acronis Cyber Protect 16
Versions: Acronis Cyber Protect Cloud Agent before build 31637, Acronis Cyber Protect 16 before build 37391
Operating Systems: Linux, macOS, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the authorization mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of protected backup data including exfiltration, modification, or deletion of sensitive information across all managed systems.

🟠

Likely Case

Unauthorized access to backup metadata and configuration data, potentially leading to data exposure or service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized network access to vulnerable components.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the vulnerable component but does not require authentication. The vulnerability is in the authorization layer.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Cyber Protect Cloud Agent build 31637 or later, Acronis Cyber Protect 16 build 37391 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-4061

Restart Required: Yes

Instructions:

1. Download the latest version from the Acronis portal. 2. Install the update on all affected systems. 3. Restart the Acronis services or reboot the systems as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Acronis management interfaces to authorized administrative networks only.

Access Control Lists

all

Implement firewall rules to limit connections to Acronis services from trusted IP addresses only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Acronis management interfaces from untrusted networks
  • Monitor network traffic to Acronis services for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check the Acronis agent version in the management console or by running the agent with version flag.

Check Version:

On Windows: 'acronis_agent.exe --version', On Linux: './acronis_agent --version' or check in /opt/acronis/ directory

Verify Fix Applied:

Verify the agent version is at or above the patched build numbers: 31637 for Cloud Agent, 37391 for Cyber Protect 16.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Acronis management APIs
  • Unexpected data access patterns in backup logs
  • Authentication bypass events

Network Indicators:

  • Unusual connections to Acronis management ports (9876, 7780, etc.) from unauthorized sources
  • Unexpected API calls to backup management endpoints

SIEM Query:

source="acronis*" AND (event_type="auth_failure" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export