Skip to main content

CVE-2025-9578: CWE-732 in Acronis Acronis Cyber Protect Cloud Agent

High
VulnerabilityCVE-2025-9578cvecve-2025-9578cwe-732
Published: Thu Aug 28 2025 (08/28/2025, 14:01:46 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect Cloud Agent

Description

Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 40734.

AI-Powered Analysis

AILast updated: 08/28/2025, 14:32:48 UTC

Technical Analysis

CVE-2025-9578 is a high-severity local privilege escalation vulnerability affecting the Acronis Cyber Protect Cloud Agent on Windows platforms, specifically versions prior to build 40734. The root cause of this vulnerability is insecure folder permissions (CWE-732), which allow a local attacker with limited privileges to escalate their rights on the affected system. The vulnerability arises because certain folders used by the agent are configured with overly permissive access controls, enabling unauthorized users to modify or replace files that the agent executes or relies upon. Exploiting this flaw does not require user interaction and can be performed with low attack complexity, as the attacker only needs local access with limited privileges. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the system, as the attacker can execute arbitrary code with elevated privileges, potentially gaining administrative control. Although no known exploits are currently reported in the wild, the vulnerability's characteristics and high CVSS score (7.8) indicate a significant risk if weaponized. The lack of a patch link suggests that remediation may require updating to a fixed build or applying vendor-provided configuration changes once available.

Potential Impact

For European organizations, this vulnerability poses a serious threat, especially for those relying on Acronis Cyber Protect Cloud Agent for endpoint protection and backup management. An attacker exploiting this flaw could gain administrative privileges on critical systems, leading to data breaches, disruption of backup and recovery processes, and potential lateral movement within corporate networks. This could compromise sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Additionally, the elevated privileges could allow attackers to disable security controls, install persistent malware, or exfiltrate confidential information. Given the widespread use of Acronis products in enterprise environments across Europe, the impact could be substantial, affecting sectors such as finance, healthcare, and government agencies that depend heavily on secure backup solutions.

Mitigation Recommendations

European organizations should prioritize upgrading the Acronis Cyber Protect Cloud Agent to build 40734 or later as soon as the vendor releases a patch addressing this vulnerability. In the interim, administrators should audit and tighten folder permissions associated with the agent, ensuring that only authorized system accounts have write access. Implementing strict access control lists (ACLs) on the relevant directories can reduce the risk of exploitation. Additionally, organizations should monitor local privilege escalation attempts via endpoint detection and response (EDR) tools, focusing on anomalous file modifications or privilege changes related to the agent's folders. Employing application whitelisting and restricting execution of unauthorized binaries can further mitigate risk. Finally, enforcing the principle of least privilege for all users and service accounts will limit the potential damage from successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Acronis
Date Reserved
2025-08-28T12:12:52.244Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b0650dad5a09ad006d6920

Added to database: 8/28/2025, 2:17:49 PM

Last enriched: 8/28/2025, 2:32:48 PM

Last updated: 8/28/2025, 3:01:00 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats