Description
Sensitive information disclosure due to improper configuration of a headless browser. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
Published: 2026-03-05
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Disclosure
Action: Patch
AI Analysis

Impact

The vulnerability arises from an improper configuration of the headless browser component in Acronis Cyber Protect 17, enabling internal data to be accessed or transmitted beyond its intended boundary. As a result, confidential information such as configuration details or authentication data can be exposed, directly compromising confidentiality of the affected environment. The flaw specifically targets the headless browser’s misconfigured permissions. When an attacker can influence the browser’s request handling, they may retrieve sensitive payloads that are normally protected. The damage is limited to information disclosure; there is no evidence of code execution or denial of service. Acronis Cyber Protect 17 users on both Linux and Windows platforms running builds before 41186 are impacted. The CVSS base score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, and while the exact attack vector is inferred to involve exploitation of local or compromised accounts interacting with the headless browser, no direct remote exploitation path has been documented.

Affected Systems

Affected systems include Acronis Cyber Protect 17 on Linux and Windows. The vulnerable builds are any versions prior to build 41186. No other product versions are currently known to be impacted.

Risk and Exploitability

The CVSS base score of 5.5 signals moderate severity, while the EPSS score of less than 1% indicates a low probability of exploitation. The exploit does not appear in the CISA KEV catalog. The vulnerability is likely to be abused by an attacker who has local or compromised access to the system and can interact with the headless browser component; no direct remote exploitation path has been documented. The flaw permits the leakage of confidential data but does not grant code execution, escalation of privilege, or denial of service.

Generated by OpenCVE AI on April 17, 2026 at 12:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Acronis Cyber Protect 17 update (build 41186 or later).
  • If an update is unavailable, reconfigure the headless browser to restrict its privileges and disable any features that expose internal data.
  • Audit system configurations to ensure no residual misconfigurations in the headless browser remain, and verify that only necessary services are running.
  • Monitor security logs for unusual headless browser activity to detect potential exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 12:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
Title Headless Browser Configuration Leak Exposes Sensitive Information

Fri, 13 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Acronis cyber Protect
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Acronis cyber Protect
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Fri, 06 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Acronis
Acronis acronis Cyber Protect 17
Vendors & Products Acronis
Acronis acronis Cyber Protect 17

Fri, 06 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description Sensitive information disclosure due to improper configuration of a headless browser. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
Weaknesses CWE-732
References
Metrics cvssV3_0

{'score': 5.5, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Acronis Acronis Cyber Protect 17 Cyber Protect
Linux Linux Kernel
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: Acronis

Published:

Updated: 2026-03-06T19:33:51.673Z

Reserved: 2026-03-03T02:29:03.754Z

Link: CVE-2026-28725

cve-icon Vulnrichment

Updated: 2026-03-06T19:29:46.989Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T00:16:13.627

Modified: 2026-03-13T16:38:17.687

Link: CVE-2026-28725

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:30:06Z

Weaknesses