CVE-2024-8767

9.9 CRITICAL

📋 TL;DR

This CVE allows attackers to access and manipulate sensitive data due to excessive privileges assigned to Acronis Backup plugins. Affected users include administrators of cPanel & WHM, Plesk, and DirectAdmin control panels running Acronis Backup plugins on Linux systems.

💻 Affected Systems

Products:
  • Acronis Backup plugin for cPanel & WHM (Linux)
  • Acronis Backup extension for Plesk (Linux)
  • Acronis Backup plugin for DirectAdmin (Linux)
Versions: Before build 619 for cPanel, before build 555 for Plesk, before build 147 for DirectAdmin
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of these plugins on supported Linux distributions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing data theft, modification, or destruction of backup data and potentially host system access.

🟠

Likely Case

Unauthorized access to sensitive backup data including customer information, configuration files, and system credentials.

🟢

If Mitigated

Limited impact with proper privilege separation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but privileges are excessive by design.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 619 for cPanel, build 555 for Plesk, build 147 for DirectAdmin

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-4976

Restart Required: Yes

Instructions:

1. Update Acronis Backup plugin through your control panel's plugin manager. 2. For cPanel: Update to build 619+. 3. For Plesk: Update to build 555+. 4. For DirectAdmin: Update to build 147+. 5. Restart affected services.

🔧 Temporary Workarounds

Temporary privilege reduction

linux

Manually adjust plugin permissions to minimum required access

# Review and modify plugin file permissions
# chmod 750 /path/to/acronis/plugin/directory
# Adjust ownership to non-privileged user

🧯 If You Can't Patch

  • Disable Acronis Backup plugins until patching is possible
  • Implement strict network segmentation and access controls for affected systems

🔍 How to Verify

Check if Vulnerable:

Check plugin version in control panel interface or run: grep -i version /path/to/acronis/plugin/files

Check Version:

Check via control panel plugin manager or examine plugin manifest files

Verify Fix Applied:

Confirm version numbers meet minimum requirements: cPanel >=619, Plesk >=555, DirectAdmin >=147

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to backup files
  • Privilege escalation events in system logs
  • Unusual file access patterns in backup directories

Network Indicators:

  • Unexpected connections to backup storage locations
  • Anomalous data transfers from backup systems

SIEM Query:

source="*acronis*" AND (event_type="privilege_escalation" OR file_access="backup*")

🔗 References

📤 Share & Export