CVE-2026-28719

4.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthorized users to manipulate resources in Acronis Cyber Protect 17 due to improper authorization checks. It affects Acronis Cyber Protect 17 installations on both Linux and Windows systems before build 41186. Attackers could potentially modify or access resources they shouldn't have permission to.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 17
Versions: All versions before build 41186
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the authorization mechanism itself.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could manipulate critical system resources, potentially leading to data corruption, service disruption, or unauthorized access to sensitive information.

🟠

Likely Case

Limited resource manipulation within the application's scope, potentially affecting backup integrity or configuration settings.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the application's own resources without system-wide compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some level of access to the system, but the authorization bypass could be leveraged by users with limited permissions to escalate privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 41186 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-8378

Restart Required: Yes

Instructions:

1. Download the latest version from Acronis official sources. 2. Run the installer to update to build 41186 or later. 3. Restart the Acronis Cyber Protect service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Acronis Cyber Protect management interfaces to trusted networks only.

Access Control Hardening

all

Implement strict access controls and monitor for unusual resource manipulation attempts.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Acronis Cyber Protect from untrusted networks
  • Enable detailed logging and monitoring for unauthorized resource access attempts

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Cyber Protect version in the management console or via command line. If version is before build 41186, the system is vulnerable.

Check Version:

On Windows: Check via Acronis Management Console. On Linux: Check via acronis_cyber_protect --version or consult product documentation.

Verify Fix Applied:

Verify the build number is 41186 or higher in the Acronis Cyber Protect management interface.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to resources
  • Unexpected resource modifications
  • Failed authorization checks

Network Indicators:

  • Unusual traffic patterns to Acronis management ports
  • Resource manipulation requests from unauthorized sources

SIEM Query:

Search for events where source_user has limited permissions but performs resource modifications in Acronis logs.

🔗 References

📤 Share & Export