Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28718: CWE-779 in Acronis Acronis Cyber Protect 17

0
Medium
VulnerabilityCVE-2026-28718cvecve-2026-28718cwe-779
Published: Thu Mar 05 2026 (03/05/2026, 23:54:05 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 17

Description

CVE-2026-28718 is a medium-severity denial of service vulnerability in Acronis Cyber Protect 17 (Linux and Windows) before build 41186. It arises from insufficient input validation in the authentication logging mechanism, allowing unauthenticated remote attackers to disrupt service availability. The vulnerability does not impact confidentiality or integrity but can cause service interruptions. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching once updates are available. This vulnerability primarily affects environments relying on Acronis Cyber Protect 17 for backup and cybersecurity protection. Mitigation involves applying vendor patches when released and monitoring authentication logs for anomalous input patterns. Countries with significant deployment of Acronis products and critical infrastructure relying on backup solutions are at higher risk. The CVSS score is 5. 3, reflecting a medium severity level due to network attack vector and no required privileges or user interaction.

AI-Powered Analysis

AILast updated: 03/06/2026, 00:19:01 UTC

Technical Analysis

CVE-2026-28718 is a vulnerability identified in Acronis Cyber Protect 17, a widely used backup and cybersecurity protection product for both Linux and Windows platforms. The flaw is categorized under CWE-779, which relates to insufficient input validation in logging mechanisms. Specifically, the vulnerability exists in the authentication logging component, where improper validation of input data can be exploited to cause a denial of service (DoS) condition. An attacker can send crafted input remotely without any authentication or user interaction, triggering the logging process to mishandle the input and disrupt normal service operations. This could lead to the affected system becoming unresponsive or crashing, thereby impacting availability. The vulnerability affects all versions of Acronis Cyber Protect 17 prior to build 41186. Although no public exploits have been reported, the ease of exploitation (network vector, no privileges required) means that attackers could potentially leverage this flaw to interrupt backup and protection services, which are critical for organizational resilience. The CVSS v3.0 base score of 5.3 reflects a medium severity, emphasizing the impact on availability without compromising confidentiality or integrity. The lack of patches at the time of reporting necessitates vigilance and interim mitigations to reduce exposure.

Potential Impact

The primary impact of CVE-2026-28718 is a denial of service condition affecting the availability of Acronis Cyber Protect 17 services. For organizations relying on this product for backup, disaster recovery, and cybersecurity protection, service disruption could delay critical data protection tasks, increasing the risk of data loss or exposure to other threats. In environments with stringent uptime requirements, such as financial institutions, healthcare providers, and critical infrastructure operators, this could lead to operational downtime and potential regulatory non-compliance. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely directly from this flaw; however, the interruption of backup services could indirectly increase risk exposure. The ease of exploitation without authentication means that attackers can attempt DoS attacks remotely, potentially targeting multiple systems simultaneously. This could be leveraged as part of a broader attack campaign to degrade organizational defenses.

Mitigation Recommendations

Organizations should monitor Acronis Cyber Protect 17 deployments and apply the official patch or update as soon as Acronis releases build 41186 or later that addresses this vulnerability. Until patches are available, administrators should implement network-level protections such as firewall rules or intrusion prevention systems to restrict access to the management and logging interfaces of Acronis Cyber Protect. Logging and monitoring should be enhanced to detect anomalous or malformed authentication log entries that could indicate exploitation attempts. Rate limiting or input sanitization proxies could be deployed to filter suspicious inputs before they reach the logging component. Additionally, organizations should review and harden their backup and recovery procedures to ensure resilience in case of service disruption. Coordination with Acronis support for guidance and timely updates is recommended. Finally, maintaining a robust incident response plan will help mitigate the impact if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2026-03-03T02:29:03.753Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69aa1963c48b3f10ff8d2b4f

Added to database: 3/6/2026, 12:01:39 AM

Last enriched: 3/6/2026, 12:19:01 AM

Last updated: 3/6/2026, 6:08:57 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses