Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30411: CWE-1390 in Acronis Acronis Cyber Protect 16

0
Critical
VulnerabilityCVE-2025-30411cvecve-2025-30411cwe-1390
Published: Fri Feb 20 2026 (02/20/2026, 00:30:14 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 16

Description

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:14:17 UTC

Technical Analysis

CVE-2025-30411 is a critical security vulnerability classified under CWE-1390, affecting Acronis Cyber Protect versions 15 and 16 on both Linux and Windows platforms prior to builds 41800 and 39938 respectively. The core issue stems from improper authentication mechanisms within the software, which allow unauthenticated attackers to gain unauthorized access to sensitive data and perform data manipulation. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network (Attack Vector: Network). The CVSS v3.0 base score of 10.0 reflects the highest severity, with impacts rated as high for confidentiality, integrity, and availability, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable component. This means an attacker can fully compromise the system, potentially leading to data breaches, disruption of backup and recovery operations, and manipulation of critical data protected by the software. Despite no known exploits currently in the wild, the vulnerability's characteristics suggest that exploitation could be straightforward for attackers with network access. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. Given Acronis Cyber Protect's role in backup, recovery, and cybersecurity management, exploitation could severely undermine organizational resilience and data security.

Potential Impact

The impact of CVE-2025-30411 is severe and multifaceted. Successful exploitation can lead to complete compromise of sensitive data confidentiality, allowing attackers to exfiltrate critical information. Integrity is also at risk, as attackers can manipulate or corrupt backup data and system configurations, potentially sabotaging recovery efforts and causing prolonged downtime. Availability is affected because attackers could disrupt backup and protection services, leading to operational outages. Organizations relying on Acronis Cyber Protect for data protection and cybersecurity management could face data breaches, loss of trust, regulatory penalties, and significant financial damage. The vulnerability's remote, unauthenticated exploitability means attackers can target systems over the internet or internal networks without needing valid credentials or user interaction, increasing the attack surface. This is particularly dangerous for enterprises, government agencies, and critical infrastructure sectors where data integrity and availability are paramount. The scope change in the CVSS vector implies that the vulnerability affects multiple components or systems, potentially enabling lateral movement or broader compromise within affected environments.

Mitigation Recommendations

Until official patches are released by Acronis, organizations should implement several specific mitigations: 1) Restrict network access to Acronis Cyber Protect management interfaces using firewalls and network segmentation to limit exposure to trusted hosts only. 2) Employ strict access control policies and monitor authentication logs for unusual or unauthorized access attempts. 3) Deploy intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous traffic patterns targeting Acronis services. 4) Conduct regular audits of backup integrity and system configurations to detect unauthorized changes early. 5) Isolate backup servers from general user networks and the internet where possible to reduce attack vectors. 6) Prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability. 7) Stay updated with Acronis security advisories and apply patches immediately once available. 8) Consider temporary disabling or limiting certain features of Acronis Cyber Protect that expose management interfaces until patches are applied. These targeted measures go beyond generic advice by focusing on reducing attack surface and enhancing detection capabilities specific to this vulnerability's characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2025-03-21T21:04:39.511Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6997b28bd7880ec89b47639e

Added to database: 2/20/2026, 1:02:03 AM

Last enriched: 2/27/2026, 8:14:17 AM

Last updated: 4/5/2026, 6:30:00 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses