Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30412: CWE-1390 in Acronis Acronis Cyber Protect 16

0
Critical
VulnerabilityCVE-2025-30412cvecve-2025-30412cwe-1390
Published: Fri Feb 20 2026 (02/20/2026, 00:30:33 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 16

Description

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:14:32 UTC

Technical Analysis

CVE-2025-30412 is a critical security vulnerability identified in Acronis Cyber Protect versions 15 and 16, affecting both Linux and Windows platforms prior to builds 41800 and 39938 respectively. The root cause is improper authentication (CWE-1390), which allows an unauthenticated attacker to gain unauthorized access to sensitive data and perform data manipulation operations. The vulnerability does not require any privileges or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.0 base score of 10.0 reflects the highest severity, with attack vector being network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and a scope change (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact metrics show complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics suggest that exploitation could lead to full system compromise, data theft, and disruption of backup and cybersecurity operations. Affected products are widely used in enterprise environments for backup, disaster recovery, and cybersecurity protection, making this vulnerability particularly dangerous. The lack of available patches at the time of publication necessitates immediate risk mitigation by organizations. The vulnerability was reserved in March 2025 and published in February 2026, indicating a recent discovery and disclosure timeline.

Potential Impact

The impact of CVE-2025-30412 is severe and far-reaching for organizations worldwide that use Acronis Cyber Protect 15 and 16. Exploitation can lead to unauthorized disclosure of sensitive data, including backup contents and security configurations, potentially exposing critical business information and personally identifiable information (PII). Attackers can also manipulate data, undermining the integrity of backups and cybersecurity defenses, which may result in corrupted recovery points and ineffective threat detection or prevention. The availability impact means attackers could disrupt backup services, causing downtime and hampering disaster recovery efforts. This could lead to significant operational disruptions, financial losses, regulatory non-compliance, and reputational damage. Given the critical role of Acronis Cyber Protect in enterprise backup and security, successful exploitation could facilitate ransomware attacks, data breaches, and prolonged system outages. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments with exposed management interfaces or insufficient network segmentation.

Mitigation Recommendations

Until official patches are released by Acronis, organizations should implement the following specific mitigations: 1) Restrict network access to Acronis Cyber Protect management interfaces using firewalls, VPNs, or network segmentation to limit exposure to trusted administrators only. 2) Monitor network traffic and system logs for unusual access patterns or unauthorized attempts to interact with Acronis services. 3) Employ strict access controls and multi-factor authentication on administrative accounts to reduce risk if authentication mechanisms are bypassed. 4) Disable or limit remote management features where feasible to reduce attack surface. 5) Maintain offline and immutable backups to ensure recovery options if backup data integrity is compromised. 6) Prepare for rapid deployment of vendor patches by establishing a vulnerability response plan and testing patch application in controlled environments. 7) Engage with Acronis support channels for updates and guidance. 8) Conduct security awareness training for IT staff to recognize potential exploitation indicators. These targeted actions go beyond generic advice by focusing on reducing exposure of vulnerable components and enhancing detection capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2025-03-21T21:04:39.511Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6997b28bd7880ec89b4763a1

Added to database: 2/20/2026, 1:02:03 AM

Last enriched: 2/27/2026, 8:14:32 AM

Last updated: 4/5/2026, 5:21:10 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses