CVE-2023-5042

7.5 HIGH

📋 TL;DR

This vulnerability allows local attackers to access sensitive information due to insecure folder permissions in Acronis Cyber Protect Home Office for Windows. Attackers can read files containing credentials, configuration data, and other sensitive information. Only Windows users of Acronis Cyber Protect Home Office are affected.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Home Office
Versions: Windows versions before build 40713
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations; requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Acronis-related credentials and sensitive system information, potentially leading to privilege escalation or lateral movement within the network.

🟠

Likely Case

Local attackers gain access to backup credentials, configuration files, and potentially other sensitive data stored in improperly secured folders.

🟢

If Mitigated

Minimal impact with proper access controls and patching; sensitive data remains protected from unauthorized local access.

🌐 Internet-Facing: LOW - This is a local privilege vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Local attackers (including malicious insiders or compromised accounts) can exploit this to access sensitive information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 40713 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-5330

Restart Required: Yes

Instructions:

1. Open Acronis Cyber Protect Home Office. 2. Check for updates in the application. 3. Install update to build 40713 or later. 4. Restart the system as prompted.

🔧 Temporary Workarounds

Manual Folder Permission Restriction

windows

Manually adjust folder permissions to restrict access to Acronis installation directories

icacls "C:\Program Files\Acronis\" /inheritance:r /grant:r "%USERNAME%":(OI)(CI)F /grant:r "SYSTEM":(OI)(CI)F /grant:r "Administrators":(OI)(CI)F

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized local access attempts
  • Isolate affected systems from sensitive networks and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect Home Office version in the application's About section or look for build number in installed programs list.

Check Version:

wmic product where "name like 'Acronis Cyber Protect Home Office%'" get version

Verify Fix Applied:

Verify version is build 40713 or later and check that Acronis installation folder permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Acronis program folders
  • Failed permission change attempts on Acronis directories

Network Indicators:

  • N/A - Local vulnerability only

SIEM Query:

EventID=4663 AND ObjectName LIKE '%Acronis%' AND Accesses LIKE '%ReadData%'

🔗 References

📤 Share & Export