Description
Unauthorized resource manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
Published: 2026-03-05
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Resource Manipulation
Action: Apply Patch
AI Analysis

Impact

An improper authorization check in Acronis Cyber Protect allows an attacker to manipulate resources they should not have access to. The vulnerability is associated with CWE-863 (Authorization Bypass Through User-Controlled Key). While the description does not specify the exact exploitation path, it implies that an authenticated or unauthenticated user can trigger actions that bypass normal access controls, potentially leading to data tampering or service disruption. The impact is limited to the scope of the affected system but can compromise the integrity of protected data or system configuration.

Affected Systems

The affected products are Acronis Cyber Protect version 17 running on Linux and Windows operating systems, specifically any build before 41186. No other versions or platforms are listed, and the vulnerability does not appear to affect earlier releases or unrelated Acronis products.

Risk and Exploitability

The CVSS score is 4.3, indicating a moderate severity impact. The EPSS score is below 1%, suggesting low observed exploit activity to date. The vulnerability is not listed in CISA’s KEV catalog. Given the improper authorization nature, the likely attack vector would involve a user with access to the Acronis application or a service running on the host. Exploitation would require successfully interacting with the affected component, potentially via standard user credentials, to perform unauthorized resource changes.

Generated by OpenCVE AI on April 17, 2026 at 12:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch to build 41186 or later.
  • Restrict user and service accounts that access the Acronis application to the minimum privileges required for their role, following the principle of least privilege.
  • Enable detailed logging for resource manipulation events, regularly monitor logs for anomalous activity, and investigate any unauthorized changes promptly.

Generated by OpenCVE AI on April 17, 2026 at 12:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
Title Improper Authorization Allows Unauthorized Resource Manipulation in Acronis Cyber Protect

Thu, 12 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Acronis cyber Protect
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Acronis cyber Protect
Linux
Linux linux Kernel
Microsoft
Microsoft windows
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Fri, 06 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Acronis
Acronis acronis Cyber Protect 17
Vendors & Products Acronis
Acronis acronis Cyber Protect 17

Fri, 06 Mar 2026 00:00:00 +0000

Type Values Removed Values Added
Description Unauthorized resource manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
Weaknesses CWE-863
References
Metrics cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Acronis Acronis Cyber Protect 17 Cyber Protect
Linux Linux Kernel
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: Acronis

Published:

Updated: 2026-03-06T19:34:34.657Z

Reserved: 2026-03-03T02:29:03.752Z

Link: CVE-2026-28709

cve-icon Vulnrichment

Updated: 2026-03-06T19:29:53.541Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T00:16:11.153

Modified: 2026-03-12T18:26:28.180

Link: CVE-2026-28709

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:45:16Z

Weaknesses