CVE-2025-9578: CWE-732 in Acronis Acronis Cyber Protect Cloud Agent
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 40734.
AI Analysis
Technical Summary
CVE-2025-9578 is a high-severity local privilege escalation vulnerability affecting the Acronis Cyber Protect Cloud Agent for Windows versions prior to build 40734. The root cause of this vulnerability is insecure folder permissions (classified under CWE-732: Incorrect Permission Assignment for Critical Resource). Specifically, the agent's installation or operational directories have permissions that allow unauthorized local users with limited privileges to modify or replace files or executables. This misconfiguration enables an attacker with low-level access to escalate their privileges to higher levels, potentially SYSTEM or administrator-level, by exploiting these writable directories. The vulnerability does not require user interaction and has a low attack complexity, but it does require local access with some privileges (PR:L). The CVSS v3.0 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, as an attacker could gain full control over the affected system. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread use of Acronis Cyber Protect Cloud Agent in enterprise environments for backup and endpoint protection. The insecure folder permissions could allow attackers to tamper with backup processes, inject malicious code, or disable security features, undermining the overall security posture of the affected systems.
Potential Impact
For European organizations, this vulnerability presents a critical risk, especially for those relying on Acronis Cyber Protect Cloud Agent for data protection and endpoint security. Successful exploitation could lead to unauthorized access to sensitive data, disruption of backup and recovery operations, and potential lateral movement within corporate networks. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government agencies in Europe. The compromise of backup agents could also facilitate ransomware attacks or data exfiltration, severely impacting business continuity and regulatory compliance under GDPR. Since the vulnerability requires local access, insider threats or attackers who have already gained initial footholds could leverage this flaw to escalate privileges and deepen their control over critical infrastructure.
Mitigation Recommendations
Organizations should prioritize updating the Acronis Cyber Protect Cloud Agent to build 40734 or later, where this vulnerability is addressed. In the absence of an immediate patch, administrators should audit and harden folder permissions associated with the agent’s installation and operational directories, ensuring that only authorized system accounts have write access. Implementing strict access control lists (ACLs) and leveraging Windows security policies to restrict modification rights can mitigate exploitation risks. Additionally, monitoring file integrity and employing endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts can provide early warning. Limiting local user privileges and enforcing the principle of least privilege across endpoints will reduce the attack surface. Regularly reviewing and updating security configurations for backup agents and conducting internal penetration testing focused on privilege escalation vectors are also recommended.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9578: CWE-732 in Acronis Acronis Cyber Protect Cloud Agent
Description
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 40734.
AI-Powered Analysis
Technical Analysis
CVE-2025-9578 is a high-severity local privilege escalation vulnerability affecting the Acronis Cyber Protect Cloud Agent for Windows versions prior to build 40734. The root cause of this vulnerability is insecure folder permissions (classified under CWE-732: Incorrect Permission Assignment for Critical Resource). Specifically, the agent's installation or operational directories have permissions that allow unauthorized local users with limited privileges to modify or replace files or executables. This misconfiguration enables an attacker with low-level access to escalate their privileges to higher levels, potentially SYSTEM or administrator-level, by exploiting these writable directories. The vulnerability does not require user interaction and has a low attack complexity, but it does require local access with some privileges (PR:L). The CVSS v3.0 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, as an attacker could gain full control over the affected system. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread use of Acronis Cyber Protect Cloud Agent in enterprise environments for backup and endpoint protection. The insecure folder permissions could allow attackers to tamper with backup processes, inject malicious code, or disable security features, undermining the overall security posture of the affected systems.
Potential Impact
For European organizations, this vulnerability presents a critical risk, especially for those relying on Acronis Cyber Protect Cloud Agent for data protection and endpoint security. Successful exploitation could lead to unauthorized access to sensitive data, disruption of backup and recovery operations, and potential lateral movement within corporate networks. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government agencies in Europe. The compromise of backup agents could also facilitate ransomware attacks or data exfiltration, severely impacting business continuity and regulatory compliance under GDPR. Since the vulnerability requires local access, insider threats or attackers who have already gained initial footholds could leverage this flaw to escalate privileges and deepen their control over critical infrastructure.
Mitigation Recommendations
Organizations should prioritize updating the Acronis Cyber Protect Cloud Agent to build 40734 or later, where this vulnerability is addressed. In the absence of an immediate patch, administrators should audit and harden folder permissions associated with the agent’s installation and operational directories, ensuring that only authorized system accounts have write access. Implementing strict access control lists (ACLs) and leveraging Windows security policies to restrict modification rights can mitigate exploitation risks. Additionally, monitoring file integrity and employing endpoint detection and response (EDR) solutions to detect unusual privilege escalation attempts can provide early warning. Limiting local user privileges and enforcing the principle of least privilege across endpoints will reduce the attack surface. Regularly reviewing and updating security configurations for backup agents and conducting internal penetration testing focused on privilege escalation vectors are also recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Acronis
- Date Reserved
- 2025-08-28T12:12:52.244Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68b0650dad5a09ad006d6920
Added to database: 8/28/2025, 2:17:49 PM
Last enriched: 9/4/2025, 6:32:08 PM
Last updated: 10/13/2025, 3:45:38 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11658: Unrestricted Upload in ProjectsAndPrograms School Management System
MediumCVE-2025-11657: Unrestricted Upload in ProjectsAndPrograms School Management System
MediumCVE-2025-11656: Unrestricted Upload in ProjectsAndPrograms School Management System
MediumCVE-2025-11655: Unrestricted Upload in Total.js Flow
MediumCVE-2025-11654: SQL Injection in yousaf530 Inferno Online Clothing Store
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.