📦 Cyber Protect
by Acronis
🔍 What is Cyber Protect?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
CVE-2024-49388 is an authorization bypass vulnerability in Acronis Cyber Protect 16 that allows attackers to manipulate sensitive information without proper authentication. This affects Acronis Cyber ...
CVE-2023-44206 is an authorization bypass vulnerability in Acronis Cyber Protect 15 that allows attackers to access and manipulate sensitive information without proper authentication. This affects all...
This vulnerability allows attackers to bypass authentication mechanisms in Acronis Cyber Protect 15, potentially leading to unauthorized access, sensitive information disclosure, and system manipulati...
This CVE describes a local privilege escalation vulnerability in Acronis Cyber Protect 16 for Windows due to DLL hijacking. Attackers with local access can exploit this to execute arbitrary code with ...
This CVE describes a local privilege escalation vulnerability in Acronis Cyber Protect 16 for Windows due to DLL hijacking. Attackers with local access can exploit this to execute arbitrary code with ...
This vulnerability allows attackers to intercept sensitive information transmitted in cleartext by the acep-collector service in Acronis Cyber Protect 16. Organizations using affected versions on Linu...
CVE-2023-44154 is an authorization bypass vulnerability in Acronis Cyber Protect 15 that allows unauthorized users to access and manipulate sensitive information. This affects Acronis Cyber Protect 15...
CVE-2023-44156 is a sensitive information disclosure vulnerability in Acronis Cyber Protect 15 caused by spell-jacking, which allows attackers to access sensitive data. This affects Acronis Cyber Prot...
Acronis Cyber Protect 15 versions before build 35979 insufficiently mask token fields, potentially exposing sensitive authentication or session tokens. This affects all users of Acronis Cyber Protect ...
This vulnerability in Acronis Agent and Cyber Protect for Windows allows attackers to access sensitive system information through excessive data collection. It affects Windows systems running vulnerab...
This CVE describes a local privilege escalation vulnerability in Acronis products for Windows. It allows a local low-privileged user to gain SYSTEM-level privileges by exploiting insecure driver commu...
This CVE describes a local privilege escalation vulnerability in Acronis products for Windows. It allows a local attacker with low privileges to gain SYSTEM-level access due to insecure driver communi...
This vulnerability allows attackers to exploit Acronis Agent and Acronis Cyber Protect 15 by binding to unrestricted IP addresses, creating an excessive attack surface. Affected systems include Acroni...
This vulnerability allows unauthorized users to access and manipulate sensitive information in Acronis products due to improper authorization checks. It affects Acronis Agent and Acronis Cyber Protect...
This vulnerability allows attackers to perform man-in-the-middle attacks by exploiting weak TLS/SSL cipher suites in Acronis Cyber Protect 15. Affected systems include Windows and Linux versions befor...
This vulnerability allows attackers to bypass certificate validation in Acronis products, potentially leading to man-in-the-middle attacks, sensitive information disclosure, and unauthorized data mani...
CVE-2022-3405 is a privilege escalation vulnerability in Acronis Agent that allows local attackers to execute arbitrary code and access sensitive information. This affects Acronis Cyber Protect 15 and...
This vulnerability allows local users to access sensitive information due to insecure folder permissions in Acronis products on Windows. It affects Acronis Agent and Acronis Cyber Protect 15 installat...
CVE-2022-30993 allows attackers to intercept sensitive information transmitted in cleartext between Acronis Cyber Protect components. This affects Acronis Cyber Protect 15 installations on Linux and W...
This CVE describes a local privilege escalation vulnerability in Acronis Windows products where child processes receive excessive permissions. An attacker with local access can exploit this to gain SY...
This vulnerability allows local attackers to escalate privileges on Windows systems by exploiting improper access control checks on named pipes. Attackers can gain SYSTEM-level privileges by connectin...
This CVE describes a DLL hijacking vulnerability in Acronis Cyber Protect 15 for Windows that allows local attackers to escalate privileges by placing a malicious DLL in a location where the applicati...
This vulnerability allows local attackers to escalate privileges on Windows systems running vulnerable versions of Acronis Cyber Protect 15. Attackers can hijack binaries to execute arbitrary code wit...
A stored cross-site scripting (XSS) vulnerability in Acronis Cyber Protect 16 allows attackers to inject malicious scripts via postMessage without proper origin validation. When exploited, this could ...
The archive-server service in Acronis Cyber Protect 16 binds to an unrestricted IP address, exposing unnecessary network attack surface. This affects Acronis Cyber Protect 16 installations on Linux an...
The acep-collector service in affected Acronis Cyber Protect 16 versions binds to an unrestricted IP address, exposing unnecessary network attack surface. This allows attackers on the same network to ...
Acronis Agent in Cyber Protect 15 has excessive privileges that can lead to sensitive information disclosure. This affects Acronis Cyber Protect 15 installations on Windows and Linux systems before bu...