Description
Information disclosure and manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
Published: 2026-03-05
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure and manipulation via improper authorization checks
Action: Immediate Patch
AI Analysis

Impact

Acronis Cyber Protect 17 contains an authorization flaw that allows an attacker to read sensitive data or alter system state beyond the intended privileges. This weakness is catalogued as CWE-863, highlighting that authentication controls are insufficient. Consequently, confidential information may be exposed and data integrity affected, potentially impacting all users of the affected installation.

Affected Systems

The vulnerability applies to the Linux and Windows editions of Acronis Cyber Protect 17 that run before build 41186. No other versions or products are listed as affected.

Risk and Exploitability

The CVSS score of 4.4 indicates a moderate risk level, while the EPSS score of less than 1% suggests that the likelihood of exploitation is low at present. The vulnerability is not listed in CISA’s KEV catalog. Attackers would most likely exploit the flaw through an authenticated or local user context, or by abusing a service that allows unauthorized access. Without a direct privilege escalation path, the vector remains limited, but still poses a confidentiality and integrity concern.

Generated by OpenCVE AI on April 16, 2026 at 11:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Acronis Cyber Protect to build 41186 or later to remove the authorization flaw.
  • If a patch cannot be applied immediately, restrict or disable the components that expose the vulnerable functionality and limit privileged access to these services.
  • Review audit logs for abnormal data reads or writes and consider implementing stricter access controls in line with CWE‑863 best practices.

Generated by OpenCVE AI on April 16, 2026 at 11:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Improper Authorization Checks in Acronis Cyber Protect 17 Allow Information Disclosure and Manipulation

Thu, 12 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Acronis cyber Protect
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Acronis cyber Protect
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Mon, 09 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Acronis
Acronis acronis Cyber Protect 17
Vendors & Products Acronis
Acronis acronis Cyber Protect 17

Fri, 06 Mar 2026 00:00:00 +0000

Type Values Removed Values Added
Description Information disclosure and manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
Weaknesses CWE-863
References
Metrics cvssV3_0

{'score': 4.4, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Acronis Acronis Cyber Protect 17 Cyber Protect
Linux Linux Kernel
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: Acronis

Published:

Updated: 2026-03-09T17:06:28.655Z

Reserved: 2026-03-03T02:29:03.753Z

Link: CVE-2026-28716

cve-icon Vulnrichment

Updated: 2026-03-09T17:06:23.881Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T00:16:12.190

Modified: 2026-03-12T15:44:54.247

Link: CVE-2026-28716

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:00:11Z

Weaknesses