Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9578: CWE-732 in Acronis Acronis Cyber Protect Cloud Agent

0
High
VulnerabilityCVE-2025-9578cvecve-2025-9578cwe-732
Published: Thu Aug 28 2025 (08/28/2025, 14:01:46 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect Cloud Agent

Description

Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 40734.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:29:19 UTC

Technical Analysis

CVE-2025-9578 is a local privilege escalation vulnerability identified in the Acronis Cyber Protect Cloud Agent for Windows, affecting versions prior to build 40734. The root cause is insecure folder permissions (classified under CWE-732), which allow a user with limited privileges to modify or replace files or directories that the agent relies upon for its operation. This misconfiguration can be exploited by an attacker who already has local access to the system to gain elevated privileges, potentially system or administrative level, without requiring user interaction. The vulnerability has a CVSS v3.0 base score of 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). Although no public exploits have been reported yet, the vulnerability poses a significant risk because it can allow attackers to bypass security controls, manipulate backup or protection processes, and compromise system integrity. The affected product, Acronis Cyber Protect Cloud Agent, is widely used in enterprise environments for backup and cyber protection, making this vulnerability relevant for organizations relying on this software. The lack of a patch link suggests that remediation may require updating to a fixed build once released or applying manual permission hardening. The vulnerability was published on August 28, 2025, and is currently in a published state with no known active exploitation.

Potential Impact

The impact of CVE-2025-9578 is substantial for organizations using Acronis Cyber Protect Cloud Agent on Windows systems. Successful exploitation allows a local attacker with limited privileges to escalate to higher privileges, potentially gaining administrative or SYSTEM-level access. This elevated access can lead to full system compromise, including unauthorized access to sensitive backup data, modification or deletion of backup files, disruption of backup and recovery processes, and the ability to install persistent malware or backdoors. The compromise of backup agents is particularly critical because backups are trusted sources for recovery; if attackers manipulate these, they can undermine incident response and disaster recovery efforts. The vulnerability affects confidentiality, integrity, and availability, making it a comprehensive threat. Organizations with large deployments of Acronis agents, especially managed service providers and enterprises with critical data protection needs, face increased risk. Although exploitation requires local access, insider threats or attackers who gain initial footholds can leverage this vulnerability to escalate privileges and move laterally within networks, amplifying the threat.

Mitigation Recommendations

To mitigate CVE-2025-9578, organizations should take the following specific actions: 1) Monitor Acronis communications and promptly apply updates or patches once a fixed build beyond 40734 is released. 2) In the interim, audit and harden folder and file permissions related to the Acronis Cyber Protect Cloud Agent installation directories to ensure that only trusted system accounts and administrators have write access, preventing unauthorized modification. 3) Restrict local user permissions and employ the principle of least privilege to limit the number of users who can log in locally or execute code on systems running the agent. 4) Implement endpoint detection and response (EDR) solutions to monitor for suspicious local privilege escalation attempts and anomalous file system changes within Acronis directories. 5) Conduct regular security awareness training to reduce insider threat risks and ensure users understand the importance of safeguarding privileged access. 6) Consider isolating backup agents on dedicated systems or virtual machines with strict access controls to reduce exposure. 7) Maintain comprehensive logging and auditing of local privilege escalations and file permission changes to enable rapid detection and response. These measures, combined with timely patching, will reduce the risk posed by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Acronis
Date Reserved
2025-08-28T12:12:52.244Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b0650dad5a09ad006d6920

Added to database: 8/28/2025, 2:17:49 PM

Last enriched: 2/27/2026, 4:29:19 AM

Last updated: 3/23/2026, 3:33:47 PM

Views: 306

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses