CVE-2025-30410: CWE-306 in Acronis Acronis Cyber Protect Cloud Agent
Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 41800.
AI Analysis
Technical Summary
CVE-2025-30410 is a critical security vulnerability identified in multiple versions of Acronis Cyber Protect Cloud Agent and Acronis Cyber Protect 15 and 16 across Linux, macOS, and Windows platforms. The root cause is a missing authentication mechanism (CWE-306), which means that the affected software does not properly verify the identity of entities attempting to access or manipulate sensitive data. This allows remote attackers to connect to the vulnerable agent over the network without any privileges or user interaction and perform unauthorized disclosure and manipulation of sensitive information. The vulnerability impacts confidentiality, integrity, and availability, as attackers can both read sensitive data and alter it, potentially disrupting backup and protection operations. The CVSS v3.0 base score of 9.8 indicates a critical severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and an unchanged scope (S:U). The affected products include Acronis Cyber Protect Cloud Agent before build 39870, Cyber Protect 16 before build 39938, and Cyber Protect 15 before build 41800. Although no public exploits have been reported yet, the vulnerability’s characteristics make it highly exploitable. The lack of authentication could allow attackers to bypass security controls, leading to unauthorized access to backup data, potential data tampering, and disruption of backup services. This could have severe consequences for organizations relying on these products for data protection and disaster recovery. The vulnerability was reserved in March 2025 and published in February 2026, indicating a recent disclosure. No official patches or mitigation links are currently provided, emphasizing the need for vigilance and interim protective measures.
Potential Impact
The impact of CVE-2025-30410 is severe for organizations worldwide that utilize Acronis Cyber Protect products for backup, recovery, and cybersecurity protection. Successful exploitation can lead to unauthorized disclosure of sensitive backup data, which may include critical business information, personally identifiable information (PII), or intellectual property. Attackers could also manipulate backup data, potentially corrupting backups or injecting malicious content, undermining data integrity and trust in recovery processes. This could result in prolonged downtime, data loss, regulatory compliance violations, and reputational damage. Since the vulnerability affects multiple operating systems and product versions, a wide range of environments are at risk. The lack of authentication requirements and user interaction means attackers can remotely exploit the vulnerability without needing credentials or user involvement, increasing the likelihood of automated or widespread attacks. The disruption of backup and protection services could also expose organizations to ransomware or other destructive attacks due to the inability to restore clean backups. Critical sectors such as finance, healthcare, government, and large enterprises that depend heavily on reliable backup solutions are particularly vulnerable to operational and financial impacts.
Mitigation Recommendations
Organizations should immediately inventory their deployments of Acronis Cyber Protect Cloud Agent and related products to identify affected versions. Until official patches are released, implement network-level access controls to restrict communication with the vulnerable agents only to trusted management and backup servers. Employ firewall rules, segmentation, and VPNs to limit exposure to untrusted networks. Monitor network traffic for unusual or unauthorized access attempts targeting Acronis agents. Enable logging and alerting on access to backup agents to detect potential exploitation attempts. Review and tighten permissions on backup data and agent configurations to minimize the risk of unauthorized changes. Coordinate with Acronis support or security advisories for timely updates and apply patches as soon as they become available. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once published. Additionally, conduct regular backups of critical data to offline or immutable storage to mitigate the impact of potential data manipulation. Educate IT and security teams about this vulnerability to ensure rapid response and containment if exploitation is suspected.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Sweden, Switzerland, Singapore
CVE-2025-30410: CWE-306 in Acronis Acronis Cyber Protect Cloud Agent
Description
Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 41800.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-30410 is a critical security vulnerability identified in multiple versions of Acronis Cyber Protect Cloud Agent and Acronis Cyber Protect 15 and 16 across Linux, macOS, and Windows platforms. The root cause is a missing authentication mechanism (CWE-306), which means that the affected software does not properly verify the identity of entities attempting to access or manipulate sensitive data. This allows remote attackers to connect to the vulnerable agent over the network without any privileges or user interaction and perform unauthorized disclosure and manipulation of sensitive information. The vulnerability impacts confidentiality, integrity, and availability, as attackers can both read sensitive data and alter it, potentially disrupting backup and protection operations. The CVSS v3.0 base score of 9.8 indicates a critical severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and an unchanged scope (S:U). The affected products include Acronis Cyber Protect Cloud Agent before build 39870, Cyber Protect 16 before build 39938, and Cyber Protect 15 before build 41800. Although no public exploits have been reported yet, the vulnerability’s characteristics make it highly exploitable. The lack of authentication could allow attackers to bypass security controls, leading to unauthorized access to backup data, potential data tampering, and disruption of backup services. This could have severe consequences for organizations relying on these products for data protection and disaster recovery. The vulnerability was reserved in March 2025 and published in February 2026, indicating a recent disclosure. No official patches or mitigation links are currently provided, emphasizing the need for vigilance and interim protective measures.
Potential Impact
The impact of CVE-2025-30410 is severe for organizations worldwide that utilize Acronis Cyber Protect products for backup, recovery, and cybersecurity protection. Successful exploitation can lead to unauthorized disclosure of sensitive backup data, which may include critical business information, personally identifiable information (PII), or intellectual property. Attackers could also manipulate backup data, potentially corrupting backups or injecting malicious content, undermining data integrity and trust in recovery processes. This could result in prolonged downtime, data loss, regulatory compliance violations, and reputational damage. Since the vulnerability affects multiple operating systems and product versions, a wide range of environments are at risk. The lack of authentication requirements and user interaction means attackers can remotely exploit the vulnerability without needing credentials or user involvement, increasing the likelihood of automated or widespread attacks. The disruption of backup and protection services could also expose organizations to ransomware or other destructive attacks due to the inability to restore clean backups. Critical sectors such as finance, healthcare, government, and large enterprises that depend heavily on reliable backup solutions are particularly vulnerable to operational and financial impacts.
Mitigation Recommendations
Organizations should immediately inventory their deployments of Acronis Cyber Protect Cloud Agent and related products to identify affected versions. Until official patches are released, implement network-level access controls to restrict communication with the vulnerable agents only to trusted management and backup servers. Employ firewall rules, segmentation, and VPNs to limit exposure to untrusted networks. Monitor network traffic for unusual or unauthorized access attempts targeting Acronis agents. Enable logging and alerting on access to backup agents to detect potential exploitation attempts. Review and tighten permissions on backup data and agent configurations to minimize the risk of unauthorized changes. Coordinate with Acronis support or security advisories for timely updates and apply patches as soon as they become available. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once published. Additionally, conduct regular backups of critical data to offline or immutable storage to mitigate the impact of potential data manipulation. Educate IT and security teams about this vulnerability to ensure rapid response and containment if exploitation is suspected.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Acronis
- Date Reserved
- 2025-03-21T21:04:39.511Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6997b28bd7880ec89b47639b
Added to database: 2/20/2026, 1:02:03 AM
Last enriched: 2/27/2026, 8:14:01 AM
Last updated: 4/5/2026, 5:21:00 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.