CVE-2024-49384

4.3 MEDIUM

📋 TL;DR

The acep-collector service in affected Acronis Cyber Protect 16 versions binds to an unrestricted IP address, exposing unnecessary network attack surface. This allows attackers on the same network to potentially interact with the service. All users of Acronis Cyber Protect 16 before build 38690 on Linux and Windows are affected.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 16
Versions: All versions before build 38690
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The acep-collector service is part of the Acronis Cyber Protect installation and is vulnerable in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exploit other vulnerabilities in the exposed service or perform denial-of-service attacks against the collector service.

🟠

Likely Case

Increased attack surface enabling reconnaissance and potential exploitation of other vulnerabilities in the service.

🟢

If Mitigated

Minimal impact if proper network segmentation and firewall rules restrict access to the service.

🌐 Internet-Facing: MEDIUM - If the service is exposed to the internet, it significantly increases attack surface, though exploitation requires additional vulnerabilities.
🏢 Internal Only: MEDIUM - Even internally, unrestricted binding increases lateral movement potential for attackers who gain network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

This vulnerability primarily increases attack surface; actual exploitation would require additional vulnerabilities in the exposed service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 38690 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-7284

Restart Required: Yes

Instructions:

1. Download and install Acronis Cyber Protect 16 build 38690 or later from the Acronis portal. 2. Apply the update through the management console. 3. Restart affected systems to ensure the acep-collector service runs with the patched configuration.

🔧 Temporary Workarounds

Restrict network access with firewall

all

Configure host or network firewalls to restrict access to the acep-collector service port (default 9876) to only trusted management systems.

# Linux example: iptables -A INPUT -p tcp --dport 9876 -s trusted_ip -j ACCEPT
# Windows example: New-NetFirewallRule -DisplayName "Restrict Acronis Collector" -Direction Inbound -LocalPort 9876 -Protocol TCP -RemoteAddress trusted_ip -Action Allow

Bind to localhost only

all

Configure the acep-collector service to bind only to localhost/127.0.0.1 instead of all interfaces.

# Edit service configuration to set bind address to 127.0.0.1
# Location varies by OS and installation

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running vulnerable Acronis Cyber Protect versions.
  • Deploy host-based firewalls to restrict inbound connections to the acep-collector service port (default 9876) to only necessary management systems.

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Cyber Protect version in the management console or run 'acronis_cyber_protect_console --version' on Linux systems. Versions before build 38690 are vulnerable.

Check Version:

acronis_cyber_protect_console --version

Verify Fix Applied:

Verify the installed version is build 38690 or later and check that the acep-collector service is not binding to 0.0.0.0 using 'netstat -an | grep :9876' on Linux or 'netstat -an | findstr :9876' on Windows.

📡 Detection & Monitoring

Log Indicators:

  • Unusual connection attempts to port 9876 from unauthorized IP addresses
  • Service restart events for acep-collector

Network Indicators:

  • Network scans targeting port 9876
  • Unexpected traffic to the acep-collector service from non-management systems

SIEM Query:

destination_port:9876 AND NOT (source_ip IN [trusted_management_ips])

🔗 References

📤 Share & Export