CVE-2026-0705

6.7 MEDIUM

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on Windows systems running vulnerable versions of Acronis Cloud Manager. Attackers can exploit insecure folder permissions to gain higher privileges than intended. Only Acronis Cloud Manager installations on Windows before build 6.4.25342.354 are affected.

💻 Affected Systems

Products:
  • Acronis Cloud Manager
Versions: All versions before build 6.4.25342.354
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of Acronis Cloud Manager. Linux versions are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local user or malware with initial access escalates to administrative privileges to install additional malware, disable security controls, or access sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems with quick detection and remediation.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain administrative control of affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. The vulnerability involves insecure folder permissions which are typically straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 6.4.25342.354 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-7316

Restart Required: Yes

Instructions:

1. Download the latest version of Acronis Cloud Manager from the official Acronis portal. 2. Run the installer to update to build 6.4.25342.354 or later. 3. Restart the system to complete the installation.

🔧 Temporary Workarounds

Restrict folder permissions

windows

Manually adjust folder permissions for Acronis Cloud Manager installation directories to restrict write access to authorized users only.

icacls "C:\Program Files\Acronis\Cloud Manager" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized privilege escalation attempts
  • Isolate affected systems from critical network segments and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Cloud Manager version in the application interface or installation directory properties.

Check Version:

Check the application version in the GUI or examine the installation directory for version information files.

Verify Fix Applied:

Verify the version shows 6.4.25342.354 or later in the application interface.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security logs showing unexpected privilege escalation events
  • Application logs showing unauthorized access to Acronis directories

Network Indicators:

  • No network indicators as this is a local exploit

SIEM Query:

EventID=4672 OR EventID=4688 with process names related to Acronis Cloud Manager

🔗 References

📤 Share & Export