CVE-2024-56413

6.1 MEDIUM

📋 TL;DR

CVE-2024-56413 is an improper session management vulnerability in Acronis Cyber Protect 16 for Windows where user sessions remain active after account deletion. This allows attackers with access to valid session tokens to maintain unauthorized access to deleted user accounts. Organizations using Acronis Cyber Protect 16 (Windows) before build 39169 are affected.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 16 (Windows)
Versions: All versions before build 39169
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of Acronis Cyber Protect 16. Other platforms and Acronis products are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers maintain persistent access to deleted administrative accounts, potentially leading to full system compromise, data exfiltration, or ransomware deployment.

🟠

Likely Case

Unauthorized access to deleted user accounts allowing privilege escalation, data access, or configuration changes depending on the deleted user's original permissions.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and regular session monitoring in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid session tokens from previously authenticated users. Attack complexity is low once an attacker obtains session credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 39169 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-7612

Restart Required: Yes

Instructions:

1. Download Acronis Cyber Protect 16 build 39169 or later from official Acronis sources. 2. Backup current configuration. 3. Install the update following Acronis documentation. 4. Restart affected systems. 5. Verify successful update.

🔧 Temporary Workarounds

Manual Session Termination

windows

Manually terminate all active sessions after user deletion through administrative interface

Session Timeout Reduction

windows

Reduce session timeout values to minimize window of opportunity

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Acronis management interfaces from general network access
  • Enforce multi-factor authentication for all administrative accounts and implement regular session auditing

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect 16 version in Windows Control Panel > Programs and Features. If version is earlier than build 39169, system is vulnerable.

Check Version:

wmic product where name="Acronis Cyber Protect" get version

Verify Fix Applied:

Verify build number is 39169 or higher in Acronis Cyber Protect console or Windows Programs and Features.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from deleted user accounts
  • Session activity continuing after user deletion events
  • Access attempts from unexpected locations/times for deleted users

Network Indicators:

  • Unusual traffic patterns from Acronis management interfaces
  • Authentication requests for deleted user accounts

SIEM Query:

source="acronis_logs" AND (event_type="user_deletion" OR user_status="deleted") AND (event_type="successful_login" OR session_start="true")

🔗 References

📤 Share & Export