CVE-2026-28727

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on macOS systems by exploiting insecure Unix socket permissions in Acronis Cyber Protect products. It affects Acronis Cyber Protect 17 and Acronis Cyber Protect Cloud Agent on macOS. Attackers with local access can gain root privileges.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 17
  • Acronis Cyber Protect Cloud Agent
Versions: Acronis Cyber Protect 17 before build 41186, Acronis Cyber Protect Cloud Agent before build 41124
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS versions of these products. Unix socket permission misconfiguration exists by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges, compromising the entire macOS system and all data/processes.

🟠

Likely Case

Local user or malware escalates to root to install persistent backdoors, steal credentials, or bypass security controls.

🟢

If Mitigated

Limited impact if proper access controls restrict local user accounts and monitoring detects privilege escalation attempts.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local system access.
🏢 Internal Only: HIGH - Any compromised local account or malware with local execution can exploit this to gain root.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once access is obtained. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Cyber Protect 17 build 41186+, Acronis Cyber Protect Cloud Agent build 41124+

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-9408

Restart Required: Yes

Instructions:

1. Update Acronis Cyber Protect 17 to build 41186 or later. 2. Update Acronis Cyber Protect Cloud Agent to build 41124 or later. 3. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user accounts to trusted personnel only and implement strict access controls.

Monitor for privilege escalation

all

Deploy endpoint detection to alert on suspicious privilege escalation attempts.

🧯 If You Can't Patch

  • Uninstall affected Acronis products if not essential.
  • Implement strict local user controls and monitor for unauthorized access.

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect version in application settings or via terminal: /Applications/Acronis\ Cyber\ Protect\ 17.app/Contents/MacOS/acronis_agent --version

Check Version:

/Applications/Acronis\ Cyber\ Protect\ 17.app/Contents/MacOS/acronis_agent --version

Verify Fix Applied:

Verify version is 41186+ for Cyber Protect 17 or 41124+ for Cloud Agent, and check Unix socket permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events in system logs
  • Acronis process spawning with root privileges from non-root users

Network Indicators:

  • None - this is a local exploit

SIEM Query:

source="macos_system_logs" AND (event="privilege_escalation" OR process="acronis" AND user!="root")

🔗 References

📤 Share & Export