CVE-2025-9578: CWE-732 in Acronis Acronis Cyber Protect Cloud Agent
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 40734.
AI Analysis
Technical Summary
CVE-2025-9578 is a high-severity local privilege escalation vulnerability affecting the Acronis Cyber Protect Cloud Agent on Windows platforms, specifically versions prior to build 40734. The root cause of this vulnerability is insecure folder permissions (CWE-732), which allow a local attacker with limited privileges to escalate their rights on the affected system. The vulnerability arises because certain folders used by the agent are configured with overly permissive access controls, enabling unauthorized users to modify or replace files that the agent executes or relies upon. Exploiting this flaw does not require user interaction and can be performed with low attack complexity, as the attacker only needs local access with limited privileges. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the system, as the attacker can execute arbitrary code with elevated privileges, potentially gaining administrative control. Although no known exploits are currently reported in the wild, the vulnerability's characteristics and high CVSS score (7.8) indicate a significant risk if weaponized. The lack of a patch link suggests that remediation may require updating to a fixed build or applying vendor-provided configuration changes once available.
Potential Impact
For European organizations, this vulnerability poses a serious threat, especially for those relying on Acronis Cyber Protect Cloud Agent for endpoint protection and backup management. An attacker exploiting this flaw could gain administrative privileges on critical systems, leading to data breaches, disruption of backup and recovery processes, and potential lateral movement within corporate networks. This could compromise sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Additionally, the elevated privileges could allow attackers to disable security controls, install persistent malware, or exfiltrate confidential information. Given the widespread use of Acronis products in enterprise environments across Europe, the impact could be substantial, affecting sectors such as finance, healthcare, and government agencies that depend heavily on secure backup solutions.
Mitigation Recommendations
European organizations should prioritize upgrading the Acronis Cyber Protect Cloud Agent to build 40734 or later as soon as the vendor releases a patch addressing this vulnerability. In the interim, administrators should audit and tighten folder permissions associated with the agent, ensuring that only authorized system accounts have write access. Implementing strict access control lists (ACLs) on the relevant directories can reduce the risk of exploitation. Additionally, organizations should monitor local privilege escalation attempts via endpoint detection and response (EDR) tools, focusing on anomalous file modifications or privilege changes related to the agent's folders. Employing application whitelisting and restricting execution of unauthorized binaries can further mitigate risk. Finally, enforcing the principle of least privilege for all users and service accounts will limit the potential damage from successful exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9578: CWE-732 in Acronis Acronis Cyber Protect Cloud Agent
Description
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 40734.
AI-Powered Analysis
Technical Analysis
CVE-2025-9578 is a high-severity local privilege escalation vulnerability affecting the Acronis Cyber Protect Cloud Agent on Windows platforms, specifically versions prior to build 40734. The root cause of this vulnerability is insecure folder permissions (CWE-732), which allow a local attacker with limited privileges to escalate their rights on the affected system. The vulnerability arises because certain folders used by the agent are configured with overly permissive access controls, enabling unauthorized users to modify or replace files that the agent executes or relies upon. Exploiting this flaw does not require user interaction and can be performed with low attack complexity, as the attacker only needs local access with limited privileges. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the system, as the attacker can execute arbitrary code with elevated privileges, potentially gaining administrative control. Although no known exploits are currently reported in the wild, the vulnerability's characteristics and high CVSS score (7.8) indicate a significant risk if weaponized. The lack of a patch link suggests that remediation may require updating to a fixed build or applying vendor-provided configuration changes once available.
Potential Impact
For European organizations, this vulnerability poses a serious threat, especially for those relying on Acronis Cyber Protect Cloud Agent for endpoint protection and backup management. An attacker exploiting this flaw could gain administrative privileges on critical systems, leading to data breaches, disruption of backup and recovery processes, and potential lateral movement within corporate networks. This could compromise sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Additionally, the elevated privileges could allow attackers to disable security controls, install persistent malware, or exfiltrate confidential information. Given the widespread use of Acronis products in enterprise environments across Europe, the impact could be substantial, affecting sectors such as finance, healthcare, and government agencies that depend heavily on secure backup solutions.
Mitigation Recommendations
European organizations should prioritize upgrading the Acronis Cyber Protect Cloud Agent to build 40734 or later as soon as the vendor releases a patch addressing this vulnerability. In the interim, administrators should audit and tighten folder permissions associated with the agent, ensuring that only authorized system accounts have write access. Implementing strict access control lists (ACLs) on the relevant directories can reduce the risk of exploitation. Additionally, organizations should monitor local privilege escalation attempts via endpoint detection and response (EDR) tools, focusing on anomalous file modifications or privilege changes related to the agent's folders. Employing application whitelisting and restricting execution of unauthorized binaries can further mitigate risk. Finally, enforcing the principle of least privilege for all users and service accounts will limit the potential damage from successful exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Acronis
- Date Reserved
- 2025-08-28T12:12:52.244Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68b0650dad5a09ad006d6920
Added to database: 8/28/2025, 2:17:49 PM
Last enriched: 8/28/2025, 2:32:48 PM
Last updated: 8/28/2025, 3:01:00 PM
Views: 4
Related Threats
CVE-2025-9585: Command Injection in Comfast CF-N1
MediumCVE-2025-9581: Command Injection in Comfast CF-N1
MediumCVE-2025-9584: Command Injection in Comfast CF-N1
MediumCVE-2025-9583: Command Injection in Comfast CF-N1
MediumCVE-2025-9580: OS Command Injection in LB-LINK BL-X26
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.