CVE-2025-11791: CWE-862 in Acronis Acronis Cyber Protect 17
CVE-2025-11791 is a medium-severity vulnerability in Acronis Cyber Protect 17 and Acronis Cyber Protect Cloud Agent affecting Linux, macOS, and Windows platforms. It arises from insufficient authorization checks (CWE-862), allowing users with limited privileges to manipulate sensitive information. The vulnerability does not impact confidentiality but can lead to integrity violations without requiring user interaction. Exploitation requires local access with low privileges, and no known exploits are currently in the wild. The affected products are widely used for backup and cybersecurity protection, making the integrity risk significant for organizations relying on these solutions. Mitigation involves applying vendor patches once available and implementing strict access controls to limit local user privileges. Countries with substantial enterprise adoption of Acronis products, including the United States, Germany, United Kingdom, Canada, Australia, Japan, and South Korea, are most at risk. Organizations should prioritize monitoring and restricting local access to these systems to reduce exploitation risk.
AI Analysis
Technical Summary
CVE-2025-11791 is a vulnerability identified in Acronis Cyber Protect 17 and Acronis Cyber Protect Cloud Agent across Linux, macOS, and Windows platforms prior to builds 41186 and 41124 respectively. The root cause is insufficient authorization checks (CWE-862), which means that the software fails to properly verify whether a user has the necessary permissions before allowing access to certain functions or data. This flaw enables users with low-level privileges (PR:L) to manipulate sensitive information, impacting the integrity of the system. The vulnerability does not affect confidentiality or availability, and no user interaction is required to exploit it. The CVSS 3.0 base score is 5.5 (medium), reflecting the local attack vector, low complexity, and the requirement of low privileges but no user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to organizations using these Acronis products for backup and cybersecurity management, as unauthorized manipulation of data could undermine system trustworthiness and recovery processes. The vulnerability affects multiple operating systems, increasing the scope of potential impact. The lack of available patches at the time of reporting necessitates immediate mitigation through access control and monitoring.
Potential Impact
The primary impact of CVE-2025-11791 is on the integrity of sensitive information managed by Acronis Cyber Protect 17 and its Cloud Agent. Attackers with low-level privileges on affected systems can manipulate data or configurations without proper authorization, potentially leading to corrupted backups, altered security settings, or compromised recovery processes. This undermines the reliability of backup and cybersecurity solutions, which are critical for organizational resilience. While confidentiality and availability are not directly affected, the integrity breach can facilitate further attacks or operational disruptions. Organizations relying heavily on Acronis products for data protection may face increased risk of data tampering, compliance violations, and operational downtime. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with multiple users or inadequate privilege separation. The absence of known exploits suggests limited current threat but also highlights the need for proactive mitigation before attackers develop exploit code.
Mitigation Recommendations
1. Apply patches from Acronis immediately once they become available to address the authorization check flaws. 2. Until patches are released, enforce strict access controls to limit local user privileges on systems running Acronis Cyber Protect 17 and Cloud Agent. 3. Implement role-based access control (RBAC) to ensure users have only the minimum necessary permissions. 4. Monitor system logs and audit trails for unusual access or modification attempts related to Acronis software components. 5. Use endpoint protection solutions to detect and prevent unauthorized local privilege escalations. 6. Regularly review and update security policies to restrict local access to trusted personnel only. 7. Educate system administrators and users about the risks of local privilege misuse and the importance of maintaining secure configurations. 8. Consider network segmentation to isolate critical backup and cybersecurity infrastructure from general user environments. 9. Maintain up-to-date backups stored securely offline to recover from potential data integrity compromises.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, South Korea, France, Netherlands, Sweden
CVE-2025-11791: CWE-862 in Acronis Acronis Cyber Protect 17
Description
CVE-2025-11791 is a medium-severity vulnerability in Acronis Cyber Protect 17 and Acronis Cyber Protect Cloud Agent affecting Linux, macOS, and Windows platforms. It arises from insufficient authorization checks (CWE-862), allowing users with limited privileges to manipulate sensitive information. The vulnerability does not impact confidentiality but can lead to integrity violations without requiring user interaction. Exploitation requires local access with low privileges, and no known exploits are currently in the wild. The affected products are widely used for backup and cybersecurity protection, making the integrity risk significant for organizations relying on these solutions. Mitigation involves applying vendor patches once available and implementing strict access controls to limit local user privileges. Countries with substantial enterprise adoption of Acronis products, including the United States, Germany, United Kingdom, Canada, Australia, Japan, and South Korea, are most at risk. Organizations should prioritize monitoring and restricting local access to these systems to reduce exploitation risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-11791 is a vulnerability identified in Acronis Cyber Protect 17 and Acronis Cyber Protect Cloud Agent across Linux, macOS, and Windows platforms prior to builds 41186 and 41124 respectively. The root cause is insufficient authorization checks (CWE-862), which means that the software fails to properly verify whether a user has the necessary permissions before allowing access to certain functions or data. This flaw enables users with low-level privileges (PR:L) to manipulate sensitive information, impacting the integrity of the system. The vulnerability does not affect confidentiality or availability, and no user interaction is required to exploit it. The CVSS 3.0 base score is 5.5 (medium), reflecting the local attack vector, low complexity, and the requirement of low privileges but no user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to organizations using these Acronis products for backup and cybersecurity management, as unauthorized manipulation of data could undermine system trustworthiness and recovery processes. The vulnerability affects multiple operating systems, increasing the scope of potential impact. The lack of available patches at the time of reporting necessitates immediate mitigation through access control and monitoring.
Potential Impact
The primary impact of CVE-2025-11791 is on the integrity of sensitive information managed by Acronis Cyber Protect 17 and its Cloud Agent. Attackers with low-level privileges on affected systems can manipulate data or configurations without proper authorization, potentially leading to corrupted backups, altered security settings, or compromised recovery processes. This undermines the reliability of backup and cybersecurity solutions, which are critical for organizational resilience. While confidentiality and availability are not directly affected, the integrity breach can facilitate further attacks or operational disruptions. Organizations relying heavily on Acronis products for data protection may face increased risk of data tampering, compliance violations, and operational downtime. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with multiple users or inadequate privilege separation. The absence of known exploits suggests limited current threat but also highlights the need for proactive mitigation before attackers develop exploit code.
Mitigation Recommendations
1. Apply patches from Acronis immediately once they become available to address the authorization check flaws. 2. Until patches are released, enforce strict access controls to limit local user privileges on systems running Acronis Cyber Protect 17 and Cloud Agent. 3. Implement role-based access control (RBAC) to ensure users have only the minimum necessary permissions. 4. Monitor system logs and audit trails for unusual access or modification attempts related to Acronis software components. 5. Use endpoint protection solutions to detect and prevent unauthorized local privilege escalations. 6. Regularly review and update security policies to restrict local access to trusted personnel only. 7. Educate system administrators and users about the risks of local privilege misuse and the importance of maintaining secure configurations. 8. Consider network segmentation to isolate critical backup and cybersecurity infrastructure from general user environments. 9. Maintain up-to-date backups stored securely offline to recover from potential data integrity compromises.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Acronis
- Date Reserved
- 2025-10-15T13:28:33.632Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 69aa1962c48b3f10ff8d2afa
Added to database: 3/6/2026, 12:01:38 AM
Last enriched: 3/6/2026, 12:21:46 AM
Last updated: 3/6/2026, 3:56:45 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.