CVE-2025-48959

6.7 MEDIUM

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Acronis Cyber Protect Cloud Agent for Windows due to insecure file permissions. Attackers with local access can exploit this to gain elevated SYSTEM privileges. Only Windows systems running vulnerable versions of Acronis Cyber Protect Cloud Agent are affected.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Cloud Agent
Versions: All versions before build 40077
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of Acronis Cyber Protect Cloud Agent. The vulnerability exists in the agent's file permission configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local user access could gain full SYSTEM privileges, enabling complete system compromise, installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Malicious insiders or attackers who gain initial foothold through phishing or other methods could escalate privileges to bypass security controls and maintain persistence on compromised systems.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained, limiting the attacker's ability to move laterally or maintain persistence.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (through phishing, compromised credentials, etc.), they can exploit this to gain full control of that system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. The vulnerability involves insecure file permissions which typically have straightforward exploitation paths once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 40077 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-8133

Restart Required: Yes

Instructions:

1. Download Acronis Cyber Protect Cloud Agent build 40077 or later from the Acronis portal. 2. Install the update on all affected Windows systems. 3. Restart the systems to complete the installation.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local access to systems running vulnerable Acronis agent to authorized personnel only

Monitor File Permission Changes

windows

Implement monitoring for unauthorized changes to Acronis-related file permissions

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into systems running the vulnerable agent
  • Deploy enhanced monitoring and alerting for privilege escalation attempts and suspicious file permission changes

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Cyber Protect Cloud Agent version in the Windows Control Panel > Programs and Features. If version is earlier than build 40077, the system is vulnerable.

Check Version:

wmic product where "name like 'Acronis Cyber Protect Cloud Agent%'" get version

Verify Fix Applied:

Verify the agent version shows build 40077 or later in Programs and Features. Check that Acronis services are running normally after update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events in Windows Security logs
  • Unauthorized file permission changes to Acronis directories
  • Suspicious process creation with SYSTEM privileges

Network Indicators:

  • Unusual outbound connections from systems after local privilege escalation

SIEM Query:

EventID=4672 AND SubjectUserName!=SYSTEM AND NewProcessName contains 'cmd.exe' OR 'powershell.exe'

🔗 References

📤 Share & Export