Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11791: CWE-862 in Acronis Acronis Cyber Protect 17

0
Medium
VulnerabilityCVE-2025-11791cvecve-2025-11791cwe-862
Published: Thu Mar 05 2026 (03/05/2026, 23:46:27 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 17

Description

Sensitive information disclosure and manipulation due to insufficient authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 41124.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:50:50 UTC

Technical Analysis

CVE-2025-11791 is a vulnerability classified under CWE-862 (Insufficient Authorization) found in Acronis Cyber Protect 17 and Acronis Cyber Protect Cloud Agent across Linux, macOS, and Windows platforms, specifically in versions before build 41186 and 41124 respectively. The flaw allows users with limited privileges (low-level authenticated users) to bypass authorization checks, enabling them to manipulate sensitive information within the product. While the vulnerability does not disclose confidential data directly, it compromises data integrity by permitting unauthorized modifications. The attack vector is local (AV:L), requiring the attacker to have some level of access to the system but no user interaction is needed (UI:N). The CVSS v3.0 base score is 5.5, reflecting medium severity due to the ease of exploitation with low privileges and the impact on integrity, but no impact on confidentiality or availability. No known exploits have been reported in the wild, and no official patches have been linked yet, indicating that the vulnerability is newly disclosed or under vendor remediation. Given that Acronis Cyber Protect is widely deployed in enterprise environments for backup and cybersecurity management, this vulnerability could be leveraged by malicious insiders or attackers who have gained limited access to escalate their capabilities and manipulate backup or security data, potentially undermining system reliability and recovery processes.

Potential Impact

The primary impact of CVE-2025-11791 is on the integrity of sensitive information managed by Acronis Cyber Protect products. Unauthorized modification of backup or security data could lead to corrupted backups, misleading security alerts, or compromised recovery processes, which in turn can disrupt business continuity and incident response. Organizations relying on these products for critical data protection may face increased risk of undetected tampering or sabotage from low-privileged users or attackers with limited access. Although confidentiality and availability are not directly affected, the integrity breach can have cascading effects on trustworthiness of backup data and security posture. The vulnerability's local attack vector limits remote exploitation but does not eliminate risk in environments where multiple users have access or where attackers have gained foothold through other means. The absence of known exploits reduces immediate threat but does not preclude future exploitation, especially in targeted attacks against enterprises using Acronis solutions.

Mitigation Recommendations

Until official patches are released, organizations should implement strict access control policies to limit local user privileges on systems running Acronis Cyber Protect 17 and Cloud Agent. Employ role-based access controls to ensure only trusted administrators have modification rights. Monitor logs and audit trails for unusual activities related to backup and security data manipulation. Consider isolating backup management systems from general user environments to reduce attack surface. Regularly review and update endpoint security measures to prevent unauthorized local access. Once patches become available, prioritize their deployment across all affected platforms. Additionally, conduct internal security awareness training to highlight risks of privilege misuse and enforce strong authentication mechanisms to reduce risk of unauthorized local access. Engage with Acronis support channels for updates on remediation and best practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2025-10-15T13:28:33.632Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69aa1962c48b3f10ff8d2afa

Added to database: 3/6/2026, 12:01:38 AM

Last enriched: 3/13/2026, 7:50:50 PM

Last updated: 4/19/2026, 12:18:56 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses