Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28719: CWE-863 in Acronis Acronis Cyber Protect 17

0
Medium
VulnerabilityCVE-2026-28719cvecve-2026-28719cwe-863
Published: Thu Mar 05 2026 (03/05/2026, 23:54:24 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 17

Description

CVE-2026-28719 is a medium severity vulnerability in Acronis Cyber Protect 17 (Linux and Windows) before build 41186, caused by improper authorization checks leading to unauthorized resource manipulation. The flaw falls under CWE-863, indicating insufficient authorization. Exploitation requires network access and low privileges but no user interaction, allowing an attacker with limited permissions to manipulate resources they should not control. There are no known exploits in the wild yet, and no patches have been linked publicly. This vulnerability impacts the integrity of the system but does not affect confidentiality or availability. Organizations using Acronis Cyber Protect 17 should prioritize verifying their build version and apply vendor patches once available. Mitigations include restricting access to the management interfaces, implementing strict role-based access controls, and monitoring for anomalous activities. Countries with significant deployments of Acronis products, especially those with critical infrastructure relying on backup and cyber protection solutions, are at higher risk. These include the United States, Germany, United Kingdom, Canada, Australia, Japan, South Korea, France, and the Netherlands. Given the medium CVSS score and the nature of the vulnerability, organizations should treat this as a moderate risk but address it promptly to prevent potential misuse.

AI-Powered Analysis

AILast updated: 03/06/2026, 00:18:48 UTC

Technical Analysis

CVE-2026-28719 is a vulnerability identified in Acronis Cyber Protect 17, affecting both Linux and Windows versions prior to build 41186. The issue is categorized under CWE-863, which involves improper authorization checks that allow unauthorized resource manipulation. Specifically, the vulnerability arises because the software fails to adequately verify whether a user or process has the necessary permissions before allowing access or modification of certain resources. This can enable an attacker with low-level privileges to perform actions beyond their authorized scope, potentially altering configurations or data that should be protected. The CVSS v3.0 base score is 4.3, reflecting a medium severity level. The vector indicates the attack can be performed remotely over the network (AV:N), requires low attack complexity (AC:L), needs privileges (PR:L), does not require user interaction (UI:N), and impacts only integrity (I:L) without affecting confidentiality or availability. No known exploits have been reported in the wild, and no official patches have been linked yet, though the vendor has reserved the CVE and published the advisory. The vulnerability's exploitation could undermine the integrity of backup and cyber protection operations managed by Acronis Cyber Protect 17, potentially leading to unauthorized changes that might disrupt backup reliability or security posture. Since Acronis Cyber Protect is widely used in enterprise environments for backup, disaster recovery, and endpoint protection, this vulnerability poses a risk to organizations relying on it for critical data protection.

Potential Impact

The primary impact of CVE-2026-28719 is on the integrity of systems running Acronis Cyber Protect 17. Unauthorized resource manipulation could allow attackers with limited privileges to alter backup configurations, policies, or data, potentially leading to corrupted backups or bypassing security controls. This undermines the trustworthiness of backup and recovery processes, which are essential for business continuity and incident response. While confidentiality and availability are not directly affected, the integrity compromise can have cascading effects, such as enabling further attacks or causing operational disruptions. Organizations worldwide using Acronis Cyber Protect 17 in their IT infrastructure, especially those in sectors like finance, healthcare, government, and critical infrastructure, could face increased risk of data loss or recovery failures. The ease of exploitation (low complexity, no user interaction) combined with network accessibility means attackers could leverage this vulnerability to escalate privileges or manipulate backup environments remotely, increasing the threat landscape for affected organizations.

Mitigation Recommendations

To mitigate CVE-2026-28719, organizations should first verify the build version of Acronis Cyber Protect 17 deployed in their environment and plan to upgrade to build 41186 or later once the vendor releases an official patch. Until patches are available, restrict network access to Acronis management interfaces using firewalls and network segmentation to limit exposure. Implement strict role-based access controls (RBAC) within Acronis Cyber Protect to ensure users have only the minimum necessary privileges, reducing the risk of unauthorized actions. Regularly audit and monitor logs for unusual or unauthorized resource manipulation attempts. Employ multi-factor authentication (MFA) for administrative access to add an additional security layer. Additionally, maintain offline or immutable backups to safeguard against potential corruption resulting from exploitation. Engage with Acronis support for any interim mitigation guidance and stay updated on vendor advisories. Finally, incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2026-03-03T02:29:03.754Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69aa1963c48b3f10ff8d2b52

Added to database: 3/6/2026, 12:01:39 AM

Last enriched: 3/6/2026, 12:18:48 AM

Last updated: 3/6/2026, 4:17:11 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses