Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28715: CWE-863 in Acronis Acronis Cyber Protect 17

0
Medium
VulnerabilityCVE-2026-28715cvecve-2026-28715cwe-863
Published: Thu Mar 05 2026 (03/05/2026, 23:52:09 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 17

Description

CVE-2026-28715 is a medium severity vulnerability in Acronis Cyber Protect 17 (Linux and Windows) before build 41186, caused by improper authorization checks leading to sensitive information disclosure. The flaw, classified under CWE-863, allows an attacker with low privileges and no user interaction to access confidential data without proper authorization. The vulnerability does not impact system integrity or availability but poses a significant confidentiality risk. Exploitation is remote network-based and requires some level of privileges, making it less trivial but still concerning. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching once available and implement strict access controls. Countries with widespread use of Acronis Cyber Protect, especially those with critical infrastructure relying on this product, face higher risk. The CVSS score of 6. 5 reflects a medium severity level due to the high confidentiality impact but limited scope and exploitation complexity.

AI-Powered Analysis

AILast updated: 03/06/2026, 00:19:51 UTC

Technical Analysis

CVE-2026-28715 is a vulnerability identified in Acronis Cyber Protect 17, a widely used backup and cybersecurity solution for both Linux and Windows platforms. The root cause is improper authorization checks (CWE-863), which means the software fails to adequately verify whether a user or process has the necessary permissions before granting access to sensitive information. This flaw can be exploited remotely over the network without requiring user interaction, but it does require the attacker to have low-level privileges (PR:L), such as a limited user account or compromised credentials with restricted access. The vulnerability specifically impacts confidentiality, allowing unauthorized disclosure of sensitive data, but does not affect the integrity or availability of the system. The CVSS v3.0 base score is 6.5, reflecting a medium severity rating, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No public exploits or active exploitation have been reported to date. The affected versions include all builds of Acronis Cyber Protect 17 prior to build 41186, though exact affected versions are unspecified. This vulnerability is critical for organizations relying on Acronis Cyber Protect for data protection and cybersecurity, as unauthorized access to sensitive information could lead to data leaks, compliance violations, and potential further attacks.

Potential Impact

The primary impact of CVE-2026-28715 is the unauthorized disclosure of sensitive information, which can compromise confidentiality and potentially expose critical data such as backup configurations, credentials, or protected files. For organizations, this can lead to data breaches, regulatory non-compliance (e.g., GDPR, HIPAA), reputational damage, and increased risk of follow-on attacks leveraging leaked information. Since the vulnerability requires low privileges but no user interaction, attackers who gain limited access to the network or systems can escalate their information access without raising immediate suspicion. The lack of impact on integrity and availability reduces the risk of system disruption but does not diminish the seriousness of data exposure. Enterprises using Acronis Cyber Protect 17 in environments with sensitive or regulated data are particularly at risk. Additionally, the vulnerability could be leveraged in targeted attacks against critical infrastructure or high-value organizations that rely on this product for backup and cybersecurity management.

Mitigation Recommendations

Organizations should immediately verify their Acronis Cyber Protect 17 build version and plan to upgrade to build 41186 or later once patches are released by the vendor. Until patches are available, implement strict network segmentation and access controls to limit exposure of Acronis management interfaces and services to trusted administrators only. Enforce the principle of least privilege rigorously to reduce the risk posed by compromised low-privilege accounts. Monitor logs and network traffic for unusual access patterns or attempts to access sensitive data through Acronis components. Consider deploying additional endpoint detection and response (EDR) tools to detect anomalous behavior related to Acronis processes. Regularly audit user permissions and review backup configurations to ensure no unauthorized changes have been made. Engage with Acronis support for any available workarounds or mitigations and stay informed on updates regarding exploit availability. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2026-03-03T02:29:03.753Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69aa1963c48b3f10ff8d2b46

Added to database: 3/6/2026, 12:01:39 AM

Last enriched: 3/6/2026, 12:19:51 AM

Last updated: 3/6/2026, 4:34:05 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses