CVE-2023-48683

7.1 HIGH

📋 TL;DR

This vulnerability allows unauthorized access to sensitive information and potential manipulation due to missing authorization checks in Acronis Cyber Protect products. Attackers could access or modify protected data without proper credentials. Affected users include organizations using Acronis Cyber Protect Cloud Agent or Acronis Cyber Protect 16 on Linux, macOS, or Windows systems.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Cloud Agent
  • Acronis Cyber Protect 16
Versions: Acronis Cyber Protect Cloud Agent before build 37758, Acronis Cyber Protect 16 before build 39169
Operating Systems: Linux, macOS, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the authorization mechanism of the agent software.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of protected backup data including exfiltration of sensitive information, modification or deletion of backups, and potential lateral movement within the environment.

🟠

Likely Case

Unauthorized access to backup data containing sensitive information such as credentials, configuration files, and business data stored in Acronis-protected systems.

🟢

If Mitigated

Limited impact with proper network segmentation, strict access controls, and monitoring in place to detect unauthorized access attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the system but does not require authentication to the Acronis agent. The CWE-862 (Missing Authorization) suggests attackers with some system access could bypass authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Cyber Protect Cloud Agent build 37758 or later, Acronis Cyber Protect 16 build 39169 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-5899

Restart Required: Yes

Instructions:

1. Download the latest version from Acronis portal. 2. Install the update on all affected systems. 3. Restart the Acronis services or reboot the system. 4. Verify the update was successful by checking the build version.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Acronis agents to only necessary management systems

Enhanced Monitoring

all

Increase logging and monitoring of Acronis agent access and activities

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with Acronis agents
  • Enable detailed logging and monitoring for any unauthorized access attempts to Acronis services

🔍 How to Verify

Check if Vulnerable:

Check the Acronis agent version in the management console or by running the agent with version flag

Check Version:

On Windows: 'acronis_agent.exe --version' or check in Programs and Features. On Linux/macOS: Check agent version in management interface or installed packages.

Verify Fix Applied:

Verify the build number is 37758 or higher for Cyber Protect Cloud Agent, or 39169 or higher for Cyber Protect 16

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Acronis agent services
  • Unexpected data access patterns in backup logs
  • Failed authorization events followed by successful data access

Network Indicators:

  • Unusual network connections to Acronis agent ports from unauthorized sources
  • Unexpected data transfers from backup storage

SIEM Query:

source="acronis" AND (event_type="access_denied" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export