CVE-2025-48962: CWE-918 in Acronis Acronis Cyber Protect 16
Sensitive information disclosure due to SSRF. The following products are affected: Acronis Cyber Protect 16 (Windows, Linux) before build 39938.
AI Analysis
Technical Summary
CVE-2025-48962 is a security vulnerability classified under CWE-918 (Server-Side Request Forgery, SSRF) affecting Acronis Cyber Protect 16 on both Windows and Linux platforms prior to build 39938. SSRF vulnerabilities occur when an attacker can manipulate a server to make unauthorized requests to internal or external resources, potentially bypassing network access controls. In this case, the vulnerability leads to sensitive information disclosure, meaning an attacker could exploit the SSRF flaw to retrieve confidential data from internal services or systems that the Acronis Cyber Protect server can access. The CVSS v3.0 score of 4.3 (medium severity) reflects that the vulnerability can be exploited remotely over the network (AV:N), requires low attack complexity (AC:L), but does require privileges (PR:L) on the system, and does not require user interaction (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability affects all unspecified versions of Acronis Cyber Protect 16 before build 39938, indicating that users running older builds are at risk. Given the nature of SSRF, attackers with some level of access could leverage this flaw to pivot within internal networks, potentially accessing sensitive internal endpoints or metadata services, leading to information leakage that could facilitate further attacks.
Potential Impact
For European organizations, the impact of this SSRF vulnerability in Acronis Cyber Protect 16 could be significant, especially for enterprises relying on this product for backup, disaster recovery, and cybersecurity management. Sensitive information disclosure could include internal configuration data, credentials, or other confidential information that attackers could use to escalate privileges or move laterally within the network. This risk is heightened in sectors with strict data protection requirements such as finance, healthcare, and government institutions. The exposure of sensitive data could lead to compliance violations under GDPR, resulting in legal and financial penalties. Additionally, the ability to access internal resources via SSRF could undermine trust in the organization's security posture and potentially facilitate more severe attacks if combined with other vulnerabilities. Since the vulnerability requires some level of privilege on the system, insider threats or attackers who have already compromised lower-privileged accounts could exploit this to deepen their access.
Mitigation Recommendations
European organizations should prioritize upgrading Acronis Cyber Protect 16 to build 39938 or later as soon as a patch is available. Until then, it is critical to restrict access to the management interfaces of Acronis Cyber Protect to trusted administrators only, ideally through network segmentation and firewall rules that limit exposure to internal IP ranges. Implement strict access controls and monitor for unusual internal requests originating from the Acronis server that could indicate SSRF exploitation attempts. Employ network-level protections such as egress filtering to prevent unauthorized outbound requests from the server to sensitive internal services. Conduct thorough audits of user privileges on the Acronis system to ensure that only necessary accounts have access, minimizing the risk of privilege misuse. Additionally, organizations should review logs for anomalous activity and consider deploying intrusion detection systems capable of identifying SSRF patterns. Finally, maintain up-to-date backups and incident response plans to quickly address any potential exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-48962: CWE-918 in Acronis Acronis Cyber Protect 16
Description
Sensitive information disclosure due to SSRF. The following products are affected: Acronis Cyber Protect 16 (Windows, Linux) before build 39938.
AI-Powered Analysis
Technical Analysis
CVE-2025-48962 is a security vulnerability classified under CWE-918 (Server-Side Request Forgery, SSRF) affecting Acronis Cyber Protect 16 on both Windows and Linux platforms prior to build 39938. SSRF vulnerabilities occur when an attacker can manipulate a server to make unauthorized requests to internal or external resources, potentially bypassing network access controls. In this case, the vulnerability leads to sensitive information disclosure, meaning an attacker could exploit the SSRF flaw to retrieve confidential data from internal services or systems that the Acronis Cyber Protect server can access. The CVSS v3.0 score of 4.3 (medium severity) reflects that the vulnerability can be exploited remotely over the network (AV:N), requires low attack complexity (AC:L), but does require privileges (PR:L) on the system, and does not require user interaction (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability affects all unspecified versions of Acronis Cyber Protect 16 before build 39938, indicating that users running older builds are at risk. Given the nature of SSRF, attackers with some level of access could leverage this flaw to pivot within internal networks, potentially accessing sensitive internal endpoints or metadata services, leading to information leakage that could facilitate further attacks.
Potential Impact
For European organizations, the impact of this SSRF vulnerability in Acronis Cyber Protect 16 could be significant, especially for enterprises relying on this product for backup, disaster recovery, and cybersecurity management. Sensitive information disclosure could include internal configuration data, credentials, or other confidential information that attackers could use to escalate privileges or move laterally within the network. This risk is heightened in sectors with strict data protection requirements such as finance, healthcare, and government institutions. The exposure of sensitive data could lead to compliance violations under GDPR, resulting in legal and financial penalties. Additionally, the ability to access internal resources via SSRF could undermine trust in the organization's security posture and potentially facilitate more severe attacks if combined with other vulnerabilities. Since the vulnerability requires some level of privilege on the system, insider threats or attackers who have already compromised lower-privileged accounts could exploit this to deepen their access.
Mitigation Recommendations
European organizations should prioritize upgrading Acronis Cyber Protect 16 to build 39938 or later as soon as a patch is available. Until then, it is critical to restrict access to the management interfaces of Acronis Cyber Protect to trusted administrators only, ideally through network segmentation and firewall rules that limit exposure to internal IP ranges. Implement strict access controls and monitor for unusual internal requests originating from the Acronis server that could indicate SSRF exploitation attempts. Employ network-level protections such as egress filtering to prevent unauthorized outbound requests from the server to sensitive internal services. Conduct thorough audits of user privileges on the Acronis system to ensure that only necessary accounts have access, minimizing the risk of privilege misuse. Additionally, organizations should review logs for anomalous activity and consider deploying intrusion detection systems capable of identifying SSRF patterns. Finally, maintain up-to-date backups and incident response plans to quickly address any potential exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Acronis
- Date Reserved
- 2025-05-29T00:22:59.557Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6840c579182aa0cae2c16b6c
Added to database: 6/4/2025, 10:15:21 PM
Last enriched: 7/7/2025, 2:13:20 AM
Last updated: 1/7/2026, 4:23:03 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.