Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28713: CWE-1392 in Acronis Acronis Cyber Protect Cloud Agent

0
High
VulnerabilityCVE-2026-28713cvecve-2026-28713cwe-1392
Published: Thu Mar 05 2026 (03/05/2026, 23:51:30 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect Cloud Agent

Description

CVE-2026-28713 is a high-severity vulnerability in Acronis Cyber Protect Cloud Agent and Acronis Cyber Protect 17 VMware versions before specified builds. It involves default credentials set for a local privileged user within the virtual appliance, allowing remote attackers to gain high confidentiality and integrity impact with limited availability impact. Exploitation requires network access, high attack complexity, no privileges, and user interaction. No known exploits are currently reported in the wild. This vulnerability poses significant risks to organizations using affected Acronis products, potentially enabling unauthorized access and control over backup and protection systems. Mitigation involves removing or changing default credentials, applying vendor patches when available, and restricting network access to management interfaces. Countries with high adoption of Acronis products and significant VMware infrastructure are most at risk.

AI-Powered Analysis

AILast updated: 03/06/2026, 00:16:32 UTC

Technical Analysis

CVE-2026-28713 is a vulnerability classified under CWE-1392 affecting Acronis Cyber Protect Cloud Agent (VMware) before build 36943 and Acronis Cyber Protect 17 (VMware) before build 41186. The core issue is the presence of default credentials configured for a local privileged user account within the virtual appliance environment. These default credentials can be exploited by an unauthenticated remote attacker with network access to the affected system, provided the attacker can induce user interaction, to gain elevated privileges. The vulnerability impacts confidentiality and integrity significantly, as an attacker could access sensitive backup data or manipulate backup configurations, potentially undermining data protection and recovery processes. The attack complexity is high, requiring user interaction, and no privileges are needed initially. The vulnerability does not heavily impact availability but could lead to limited denial of service or disruption. No public exploits have been reported yet, but the presence of default privileged credentials is a critical security oversight that could be leveraged in targeted attacks. The vulnerability affects virtualized environments running Acronis Cyber Protect Cloud Agent or Acronis Cyber Protect 17 on VMware, which are widely used for enterprise backup and disaster recovery solutions. The lack of available patches at the time of reporting necessitates immediate mitigation steps by administrators.

Potential Impact

The vulnerability allows unauthorized remote attackers to leverage default privileged credentials to gain access to the Acronis virtual appliance environment. This can lead to unauthorized disclosure of sensitive backup data, manipulation or deletion of backup sets, and potential compromise of the backup infrastructure integrity. Organizations relying on Acronis Cyber Protect products for data protection and disaster recovery could face significant operational risks, including loss of data integrity and confidentiality. Although availability impact is limited, the compromise of backup systems can severely affect recovery capabilities after an incident. The high confidentiality and integrity impact combined with the widespread use of Acronis products in enterprise environments makes this a critical concern for organizations managing sensitive or regulated data. Attackers exploiting this vulnerability could establish persistent footholds within backup environments, complicating incident response and remediation efforts.

Mitigation Recommendations

1. Immediately identify and change any default credentials on local privileged user accounts within the Acronis virtual appliance environment. 2. Restrict network access to management interfaces of the Acronis Cyber Protect Cloud Agent and related virtual appliances using network segmentation, firewalls, and VPNs to limit exposure. 3. Monitor network traffic and logs for unusual authentication attempts or access patterns targeting the Acronis virtual appliances. 4. Apply vendor patches or updates as soon as they become available to address this vulnerability. 5. Implement multi-factor authentication (MFA) where possible for administrative access to backup management consoles. 6. Conduct regular audits of user accounts and credentials within backup environments to detect and remediate insecure configurations. 7. Educate administrators and users about the risks of default credentials and enforce strong password policies. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting this vulnerability. 9. Maintain up-to-date backups isolated from the network to ensure recovery capability in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2026-03-03T02:29:03.753Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69aa1963c48b3f10ff8d2b40

Added to database: 3/6/2026, 12:01:39 AM

Last enriched: 3/6/2026, 12:16:32 AM

Last updated: 3/6/2026, 5:41:05 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses