CVE-2024-34014

5.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to overwrite arbitrary files during recovery operations due to improper symbolic link handling in Acronis backup plugins. It affects Acronis backup plugins for cPanel & WHM, Plesk, and DirectAdmin on Linux systems. Attackers could potentially escalate privileges or modify critical system files.

💻 Affected Systems

Products:
  • Acronis Backup plugin for cPanel & WHM (Linux)
  • Acronis Backup extension for Plesk (Linux)
  • Acronis Backup plugin for DirectAdmin (Linux)
Versions: Acronis Backup plugin for cPanel & WHM (Linux) before build 1.8.3.818 and 1.9.1.892, Acronis Backup extension for Plesk (Linux) before build 1.8.6.599, Acronis Backup plugin for DirectAdmin (Linux) before build 1.2.2.181
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Linux versions of the plugins. Requires access to the hosting control panel environment where the plugins are installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through privilege escalation or modification of critical system files like /etc/passwd or /etc/shadow, leading to root access.

🟠

Likely Case

Local privilege escalation allowing attackers to gain higher privileges than intended, potentially compromising the hosting control panel environment.

🟢

If Mitigated

Limited impact with proper file permissions and isolation, potentially only affecting non-critical files within the backup plugin's scope.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the system and knowledge of symbolic link attacks. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Backup plugin for cPanel & WHM (Linux) build 1.8.3.818 or 1.9.1.892, Acronis Backup extension for Plesk (Linux) build 1.8.6.599, Acronis Backup plugin for DirectAdmin (Linux) build 1.2.2.181

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-7592

Restart Required: No

Instructions:

1. Log into your hosting control panel (cPanel/WHM, Plesk, or DirectAdmin). 2. Navigate to the plugin/extension management section. 3. Check for updates to the Acronis Backup plugin. 4. Update to the patched version. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable symbolic link following

linux

Configure the system to prevent symbolic link attacks by restricting symlink following in relevant directories

chmod -R 755 /path/to/backup/directory
find /path/to/backup/directory -type l -delete

Restrict file permissions

linux

Set strict file permissions on backup directories to prevent unauthorized file modifications

chown root:root /path/to/backup/directory
chmod 700 /path/to/backup/directory

🧯 If You Can't Patch

  • Temporarily disable the Acronis backup plugin until patching is possible
  • Implement strict access controls and monitor for suspicious file modification attempts

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in your hosting control panel's plugin management interface and compare against affected versions

Check Version:

Check via hosting control panel interface; no universal CLI command available

Verify Fix Applied:

Verify the plugin version shows as patched (1.8.3.818+, 1.9.1.892+, 1.8.6.599+, or 1.2.2.181+ depending on product)

📡 Detection & Monitoring

Log Indicators:

  • Unusual file modification patterns in backup directories
  • Multiple failed recovery attempts
  • Unexpected symbolic link creation in backup paths

Network Indicators:

  • None - this is a local file system vulnerability

SIEM Query:

source="acronis_backup.log" AND (event="file_overwrite" OR event="symlink_detected")

🔗 References

📤 Share & Export