CVE-2025-11790

4.4 MEDIUM

📋 TL;DR

Acronis Cyber Protect Cloud Agent fails to delete credentials after plan revocation, leaving authentication data accessible. This affects all platforms (Linux, macOS, Windows) running vulnerable versions. Attackers could potentially access these credentials to compromise systems.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Cloud Agent
Versions: All versions before build 41124
Operating Systems: Linux, macOS, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable; requires plan revocation to trigger the credential retention issue.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Stored credentials are used to gain unauthorized access to backup systems, potentially leading to data exfiltration, ransomware deployment, or system compromise.

🟠

Likely Case

Local attackers or malware could harvest credentials for lateral movement within the environment or to access backup data.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to credential exposure on individual systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to read credential files; no authentication bypass needed once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 41124 or later

Vendor Advisory: https://security-advisory.acronis.com/SEC-8658

Restart Required: Yes

Instructions:

1. Update Acronis Cyber Protect Cloud Agent to build 41124 or later. 2. Restart the agent service. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Manual credential cleanup

all

Manually remove stored credentials after plan revocation

# Location varies by OS - check Acronis documentation for credential storage paths
# Remove credential files after confirming plan revocation

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access systems running Acronis Agent
  • Monitor credential storage locations for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Acronis Agent version: if below build 41124, system is vulnerable. Also check if credentials remain after plan revocation.

Check Version:

# Windows: Check Acronis Agent version in Control Panel or Services
# Linux/macOS: Check agent version via package manager or agent status command

Verify Fix Applied:

After updating to build 41124+, verify credentials are properly deleted during plan revocation process.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts using old credentials
  • Unauthorized access to backup systems
  • Unexpected credential file access

Network Indicators:

  • Unusual outbound connections from Acronis Agent systems
  • Traffic to backup systems from unexpected sources

SIEM Query:

source="acronis-agent" AND (event_type="credential_access" OR event_type="authentication_failure")

🔗 References

📤 Share & Export