Code Execution and Information Disclosure in Acronis Cyber Protect and Backup
CVE-2022-3405

9.3CRITICAL

Key Information:

Vendor
Acronis
Vendor
CVE Published:
3 May 2023

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability in Acronis Cyber Protect and Acronis Cyber Backup arises from excessive privileges assigned to the Acronis Agent, leading to potential code execution and unauthorized access to sensitive information. Malicious actors may exploit this weakness to execute commands remotely. This affects versions prior to specified builds for both Windows and Linux operating systems, marking a critical concern for users relying on these security products.

Affected Version(s)

Acronis Cyber Backup 12.5 Windows < 16545

Acronis Cyber Protect 15 Windows < 29486

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sandro Tolksdorf of usd AG (https://herolab.usd.de)
@boldglum (https://hackerone.com/boldglum)
.