CVE-2026-28710

8.1 HIGH

📋 TL;DR

CVE-2026-28710 allows attackers to access and manipulate sensitive information in Acronis Cyber Protect 17 due to improper authentication. This affects all Acronis Cyber Protect 17 installations on Linux and Windows systems before build 41186. The vulnerability could lead to unauthorized data exposure and system compromise.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 17
Versions: All versions before build 41186
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with unauthorized access to all protected data, configuration manipulation, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized access to sensitive backup data, configuration files, and system information leading to data theft or manipulation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, but still potential for information disclosure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves improper authentication, suggesting relatively straightforward exploitation once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 41186 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-9137

Restart Required: Yes

Instructions:

1. Download the latest version from Acronis official website. 2. Run the installer to update to build 41186 or later. 3. Restart the Acronis Cyber Protect service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Acronis Cyber Protect to only trusted management networks

Use firewall rules to block external access to Acronis ports (typically 9876, 443)

Access Control Hardening

all

Implement strict access controls and multi-factor authentication for management interfaces

Configure network ACLs and enable MFA if supported

🧯 If You Can't Patch

  • Isolate the Acronis server from internet and untrusted networks
  • Implement strict network segmentation and monitor for unusual access patterns

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Cyber Protect version in the management console or via command line. If version is earlier than build 41186, the system is vulnerable.

Check Version:

On Windows: 'acronis_cyber_protect --version' or check in GUI. On Linux: '/opt/acronis/cyberprotection/bin/acronis_cyber_protect --version'

Verify Fix Applied:

Verify the version shows build 41186 or later in the management console or via version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Acronis services
  • Unusual authentication patterns
  • Configuration changes without proper authorization

Network Indicators:

  • Unexpected connections to Acronis management ports (9876, 443) from untrusted sources
  • Unusual data transfers from Acronis server

SIEM Query:

source="acronis*" AND (event_type="authentication_failure" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export