CVE-2022-44746: CWE-200 in Acronis Acronis Cyber Protect Home Office
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.
AI Analysis
Technical Summary
CVE-2022-44746 is a vulnerability classified under CWE-200 (Information Exposure) affecting Acronis Cyber Protect Home Office for Windows versions prior to build 40107. The root cause of this vulnerability is insecure folder permissions, which can lead to the disclosure of sensitive information stored within these folders. Specifically, the application’s folder permissions are not properly restricted, allowing unauthorized local users with limited privileges to access potentially sensitive data. The vulnerability requires local access (Attack Vector: Local) and low privileges (Privileges Required: Low) but does require user interaction (User Interaction: Required). The CVSS v3.0 base score is 2.2, indicating a low severity level. The impact is limited to confidentiality (C:L), with no impact on integrity or availability. Exploitation complexity is high, meaning an attacker must overcome certain conditions to exploit the vulnerability. There are no known exploits in the wild, and no patches were explicitly linked in the provided information, though presumably, builds after 40107 address the issue. This vulnerability does not allow remote exploitation and does not affect system integrity or availability, but it could expose sensitive user data stored by the application to unauthorized local users, which could be leveraged for further attacks or privacy violations.
Potential Impact
For European organizations, the primary impact of CVE-2022-44746 is the potential unauthorized disclosure of sensitive backup or cybersecurity-related data stored by Acronis Cyber Protect Home Office on Windows endpoints. This could include personal data, backup configurations, or other confidential information. While the vulnerability requires local access and user interaction, it poses a risk in environments where multiple users share systems or where attackers have gained limited local access through other means (e.g., phishing, social engineering, or lateral movement after initial compromise). The confidentiality breach could lead to privacy violations under GDPR if personal data is exposed, potentially resulting in regulatory penalties and reputational damage. However, since the vulnerability does not affect system integrity or availability, it is unlikely to cause operational disruption. The risk is more pronounced in organizations with less strict endpoint access controls or in shared workstation environments. Overall, the impact is moderate but should not be ignored, especially in sectors handling sensitive personal or business data.
Mitigation Recommendations
To mitigate CVE-2022-44746, European organizations should: 1) Ensure that all installations of Acronis Cyber Protect Home Office are updated to build 40107 or later, where the folder permission issues are resolved. 2) Review and harden file system permissions on folders used by Acronis products to restrict access strictly to authorized users and system processes only. 3) Implement strict endpoint access controls, including limiting local user accounts and enforcing the principle of least privilege to reduce the risk of unauthorized local access. 4) Monitor and audit local user activities on endpoints running Acronis software to detect any unusual access patterns. 5) Educate users about the risks of local privilege escalation and the importance of not interacting with suspicious prompts or software. 6) In multi-user environments, consider isolating user profiles or using virtualization/containerization to limit cross-user data exposure. These steps go beyond generic patching advice by emphasizing permission audits, endpoint hardening, and user behavior monitoring specific to the nature of this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2022-44746: CWE-200 in Acronis Acronis Cyber Protect Home Office
Description
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.
AI-Powered Analysis
Technical Analysis
CVE-2022-44746 is a vulnerability classified under CWE-200 (Information Exposure) affecting Acronis Cyber Protect Home Office for Windows versions prior to build 40107. The root cause of this vulnerability is insecure folder permissions, which can lead to the disclosure of sensitive information stored within these folders. Specifically, the application’s folder permissions are not properly restricted, allowing unauthorized local users with limited privileges to access potentially sensitive data. The vulnerability requires local access (Attack Vector: Local) and low privileges (Privileges Required: Low) but does require user interaction (User Interaction: Required). The CVSS v3.0 base score is 2.2, indicating a low severity level. The impact is limited to confidentiality (C:L), with no impact on integrity or availability. Exploitation complexity is high, meaning an attacker must overcome certain conditions to exploit the vulnerability. There are no known exploits in the wild, and no patches were explicitly linked in the provided information, though presumably, builds after 40107 address the issue. This vulnerability does not allow remote exploitation and does not affect system integrity or availability, but it could expose sensitive user data stored by the application to unauthorized local users, which could be leveraged for further attacks or privacy violations.
Potential Impact
For European organizations, the primary impact of CVE-2022-44746 is the potential unauthorized disclosure of sensitive backup or cybersecurity-related data stored by Acronis Cyber Protect Home Office on Windows endpoints. This could include personal data, backup configurations, or other confidential information. While the vulnerability requires local access and user interaction, it poses a risk in environments where multiple users share systems or where attackers have gained limited local access through other means (e.g., phishing, social engineering, or lateral movement after initial compromise). The confidentiality breach could lead to privacy violations under GDPR if personal data is exposed, potentially resulting in regulatory penalties and reputational damage. However, since the vulnerability does not affect system integrity or availability, it is unlikely to cause operational disruption. The risk is more pronounced in organizations with less strict endpoint access controls or in shared workstation environments. Overall, the impact is moderate but should not be ignored, especially in sectors handling sensitive personal or business data.
Mitigation Recommendations
To mitigate CVE-2022-44746, European organizations should: 1) Ensure that all installations of Acronis Cyber Protect Home Office are updated to build 40107 or later, where the folder permission issues are resolved. 2) Review and harden file system permissions on folders used by Acronis products to restrict access strictly to authorized users and system processes only. 3) Implement strict endpoint access controls, including limiting local user accounts and enforcing the principle of least privilege to reduce the risk of unauthorized local access. 4) Monitor and audit local user activities on endpoints running Acronis software to detect any unusual access patterns. 5) Educate users about the risks of local privilege escalation and the importance of not interacting with suspicious prompts or software. 6) In multi-user environments, consider isolating user profiles or using virtualization/containerization to limit cross-user data exposure. These steps go beyond generic patching advice by emphasizing permission audits, endpoint hardening, and user behavior monitoring specific to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Acronis
- Date Reserved
- 2022-11-04T17:26:52.916Z
- Cisa Enriched
- true
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee20c
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 6/25/2025, 6:21:41 AM
Last updated: 7/29/2025, 7:28:40 PM
Views: 11
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.