Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30416: CWE-862 in Acronis Acronis Cyber Protect 16

0
Critical
VulnerabilityCVE-2025-30416cvecve-2025-30416cwe-862
Published: Fri Feb 20 2026 (02/20/2026, 00:31:27 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 16

Description

Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:14:47 UTC

Technical Analysis

CVE-2025-30416 is a critical security vulnerability classified under CWE-862 (Missing Authorization) affecting Acronis Cyber Protect versions 15 and 16 on both Linux and Windows platforms. The vulnerability arises from insufficient authorization checks within the product, allowing an unauthenticated attacker to access and manipulate sensitive data arbitrarily. The flaw affects all versions prior to build 39938 for Acronis Cyber Protect 16 and prior to build 41800 for version 15. The CVSS v3.0 base score is 10.0, reflecting the highest severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and complete impact on confidentiality (C:H), integrity (I:H), and availability (A:H). This means an attacker can remotely exploit the vulnerability without any credentials or user action, potentially leading to full system compromise, data leakage, and disruption of backup and protection services. Although no exploits are currently known in the wild, the critical nature and ease of exploitation make this a high-priority threat. The vulnerability affects core components responsible for data protection and backup management, which are integral to enterprise cybersecurity posture. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies to prevent exploitation.

Potential Impact

The impact of CVE-2025-30416 is severe for organizations worldwide using Acronis Cyber Protect 15 and 16. Exploitation can lead to unauthorized disclosure of sensitive backup data, manipulation or deletion of critical backup files, and disruption of backup and recovery operations. This compromises the confidentiality, integrity, and availability of organizational data and systems, potentially resulting in data breaches, operational downtime, and loss of trust. Enterprises relying on Acronis for cybersecurity and data protection may face increased risk of ransomware attacks or data loss due to compromised backup integrity. The vulnerability's network accessibility and lack of required privileges mean attackers can exploit it remotely and at scale, increasing the threat to large organizations and managed service providers. Critical infrastructure sectors such as finance, healthcare, government, and energy that depend on reliable backup solutions are especially vulnerable. The absence of known exploits currently provides a window for proactive defense, but the critical severity demands urgent attention.

Mitigation Recommendations

Until official patches are released, organizations should implement strict network segmentation to isolate Acronis Cyber Protect management interfaces from untrusted networks. Employ firewall rules to restrict access to the product's management ports to only trusted administrators and systems. Conduct thorough access control audits to ensure no unauthorized users have access to Acronis systems. Enable and monitor detailed logging and alerting for any unusual access patterns or data manipulation attempts related to Acronis Cyber Protect. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous activity on these products. Limit exposure by disabling unnecessary services or interfaces within Acronis Cyber Protect. Once patches are available, prioritize immediate testing and deployment in all affected environments. Additionally, review and update incident response plans to address potential exploitation scenarios involving backup data compromise. Engage with Acronis support for guidance and stay informed on patch releases and advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2025-03-21T21:04:39.511Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6997b28bd7880ec89b4763a4

Added to database: 2/20/2026, 1:02:03 AM

Last enriched: 2/27/2026, 8:14:47 AM

Last updated: 4/5/2026, 5:21:20 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses