Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28722: CWE-610 in Acronis Acronis Cyber Protect 17

0
High
VulnerabilityCVE-2026-28722cvecve-2026-28722cwe-610
Published: Thu Mar 05 2026 (03/05/2026, 23:55:18 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 17

Description

CVE-2026-28722 is a high-severity local privilege escalation vulnerability in Acronis Cyber Protect 17 for Windows before build 41186. It arises from improper handling of symbolic links (soft links), categorized under CWE-610. An attacker with limited privileges and requiring user interaction can exploit this flaw to gain elevated privileges, potentially compromising confidentiality, integrity, and availability of the affected system. No known exploits are currently reported in the wild. Organizations using this product should prioritize patching once available and implement strict file system permissions and monitoring to mitigate risk. The vulnerability primarily affects Windows environments running Acronis Cyber Protect 17, widely used for backup and cybersecurity protection. Countries with significant deployment of this product and critical infrastructure relying on it are at higher risk. Given the CVSS score of 7. 3 and the nature of the vulnerability, the threat is considered high severity.

AI-Powered Analysis

AILast updated: 03/06/2026, 00:15:36 UTC

Technical Analysis

CVE-2026-28722 is a local privilege escalation vulnerability identified in Acronis Cyber Protect 17 for Windows versions prior to build 41186. The root cause is improper handling of symbolic links (soft links), which falls under CWE-610 (Improper Restriction of Symbolic Links in a File System). This vulnerability allows an attacker with limited privileges on the affected system to exploit the way the software processes symbolic links, potentially redirecting operations to unintended files or directories. By doing so, the attacker can escalate their privileges to a higher level, gaining unauthorized access to sensitive system functions or data. The vulnerability requires local access and user interaction, meaning the attacker must already have some level of access and perform an action to trigger the exploit. The CVSS v3.0 base score of 7.3 reflects a high severity, with metrics indicating low attack complexity, low privileges required, and user interaction needed. The impact covers confidentiality, integrity, and availability, all rated high, meaning the attacker could potentially read, modify, or disrupt critical system components. No patches or exploits are currently publicly available, but the risk remains significant due to the nature of the vulnerability and the critical role of Acronis Cyber Protect in enterprise backup and cybersecurity operations.

Potential Impact

The vulnerability allows attackers with limited local access to escalate privileges, potentially gaining administrative control over affected systems. This can lead to unauthorized access to sensitive backup data, manipulation or deletion of backups, and disruption of cybersecurity protections provided by Acronis Cyber Protect 17. Such control could enable attackers to bypass security controls, install persistent malware, or disrupt business continuity by compromising backup integrity and availability. Organizations relying on this software for data protection and recovery could face significant operational and reputational damage if exploited. The impact is particularly severe in environments where Acronis Cyber Protect is deployed on critical servers or endpoints, including enterprise, government, and industrial systems. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a viable target for attackers seeking local privilege escalation vectors.

Mitigation Recommendations

1. Apply official patches or updates from Acronis as soon as they become available to address the symbolic link handling flaw. 2. Until patches are released, restrict local user permissions to the minimum necessary, preventing untrusted users from accessing or modifying files related to Acronis Cyber Protect. 3. Implement strict file system permissions and monitor for suspicious symbolic link creation or modification activities in directories used by the software. 4. Use application whitelisting and endpoint detection and response (EDR) tools to detect and block unauthorized privilege escalation attempts. 5. Educate users about the risks of executing untrusted files or scripts that could trigger the vulnerability. 6. Regularly audit and review system logs for anomalies related to file system operations and privilege escalations. 7. Consider isolating critical backup servers and limiting local access to trusted administrators only. These measures, combined with timely patching, will reduce the risk of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2026-03-03T02:29:03.754Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69aa1963c48b3f10ff8d2b5b

Added to database: 3/6/2026, 12:01:39 AM

Last enriched: 3/6/2026, 12:15:36 AM

Last updated: 3/6/2026, 1:03:05 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses