Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30410: CWE-306 in Acronis Acronis Cyber Protect Cloud Agent

0
Critical
VulnerabilityCVE-2025-30410cvecve-2025-30410cwe-306
Published: Fri Feb 20 2026 (02/20/2026, 00:31:05 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect Cloud Agent

Description

Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 41800.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:14:01 UTC

Technical Analysis

CVE-2025-30410 is a critical security vulnerability identified in multiple versions of Acronis Cyber Protect Cloud Agent and Acronis Cyber Protect 15 and 16 across Linux, macOS, and Windows platforms. The root cause is a missing authentication mechanism (CWE-306), which means that the affected software does not properly verify the identity of entities attempting to access or manipulate sensitive data. This allows remote attackers to connect to the vulnerable agent over the network without any privileges or user interaction and perform unauthorized disclosure and manipulation of sensitive information. The vulnerability impacts confidentiality, integrity, and availability, as attackers can both read sensitive data and alter it, potentially disrupting backup and protection operations. The CVSS v3.0 base score of 9.8 indicates a critical severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and an unchanged scope (S:U). The affected products include Acronis Cyber Protect Cloud Agent before build 39870, Cyber Protect 16 before build 39938, and Cyber Protect 15 before build 41800. Although no public exploits have been reported yet, the vulnerability’s characteristics make it highly exploitable. The lack of authentication could allow attackers to bypass security controls, leading to unauthorized access to backup data, potential data tampering, and disruption of backup services. This could have severe consequences for organizations relying on these products for data protection and disaster recovery. The vulnerability was reserved in March 2025 and published in February 2026, indicating a recent disclosure. No official patches or mitigation links are currently provided, emphasizing the need for vigilance and interim protective measures.

Potential Impact

The impact of CVE-2025-30410 is severe for organizations worldwide that utilize Acronis Cyber Protect products for backup, recovery, and cybersecurity protection. Successful exploitation can lead to unauthorized disclosure of sensitive backup data, which may include critical business information, personally identifiable information (PII), or intellectual property. Attackers could also manipulate backup data, potentially corrupting backups or injecting malicious content, undermining data integrity and trust in recovery processes. This could result in prolonged downtime, data loss, regulatory compliance violations, and reputational damage. Since the vulnerability affects multiple operating systems and product versions, a wide range of environments are at risk. The lack of authentication requirements and user interaction means attackers can remotely exploit the vulnerability without needing credentials or user involvement, increasing the likelihood of automated or widespread attacks. The disruption of backup and protection services could also expose organizations to ransomware or other destructive attacks due to the inability to restore clean backups. Critical sectors such as finance, healthcare, government, and large enterprises that depend heavily on reliable backup solutions are particularly vulnerable to operational and financial impacts.

Mitigation Recommendations

Organizations should immediately inventory their deployments of Acronis Cyber Protect Cloud Agent and related products to identify affected versions. Until official patches are released, implement network-level access controls to restrict communication with the vulnerable agents only to trusted management and backup servers. Employ firewall rules, segmentation, and VPNs to limit exposure to untrusted networks. Monitor network traffic for unusual or unauthorized access attempts targeting Acronis agents. Enable logging and alerting on access to backup agents to detect potential exploitation attempts. Review and tighten permissions on backup data and agent configurations to minimize the risk of unauthorized changes. Coordinate with Acronis support or security advisories for timely updates and apply patches as soon as they become available. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once published. Additionally, conduct regular backups of critical data to offline or immutable storage to mitigate the impact of potential data manipulation. Educate IT and security teams about this vulnerability to ensure rapid response and containment if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2025-03-21T21:04:39.511Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6997b28bd7880ec89b47639b

Added to database: 2/20/2026, 1:02:03 AM

Last enriched: 2/27/2026, 8:14:01 AM

Last updated: 4/5/2026, 5:21:00 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses