Impact
This vulnerability arises from an improper authentication mechanism that allows an attacker to bypass the intended login checks and gain unauthorized read or modification rights to protected data stored by Acronis Cyber Protect. The flaw is identified as CWE-1390, which highlights the failure to properly handle authentication and authorization conditions. The impact is a potential exposure of any data the application manages, leading to confidentiality compromise.
Affected Systems
Acronis Cyber Protect 17 on Linux and Windows prior to build 41186.
Risk and Exploitability
Based on the description, it is inferred that the attack vector is remote network exposure, with crafted requests that do not carry valid credentials. The CVSS score of 9.8 denotes a high severity exposure. The EPSS score of less than 1% suggests that exploitation is not common at the time of this assessment, yet the vulnerability can be triggered remotely when the service is reachable. The issue is not listed in CISA’s KEV catalog, but because it removes authentication safeguards, any actor able to reach the Acronis service can immediately obtain access to sensitive information.
OpenCVE Enrichment