CVE-2026-28723: CWE-863 in Acronis Acronis Cyber Protect 17
CVE-2026-28723 is a medium severity vulnerability in Acronis Cyber Protect 17 (Linux and Windows) before build 41186 that allows unauthorized deletion of reports due to insufficient access control (CWE-863). The flaw requires low privileges (PR:L) but no user interaction and can be exploited remotely (AV:N). While it does not impact confidentiality or availability, it compromises integrity by allowing unauthorized modification of report data. No known exploits are currently in the wild. Organizations relying on Acronis Cyber Protect 17 for backup and cybersecurity management should prioritize applying patches once available and implement strict access controls to mitigate risk. Countries with significant deployments of Acronis products, especially those with critical infrastructure and enterprise environments, are most at risk. This vulnerability highlights the importance of robust authorization checks in security management software to prevent unauthorized actions that could hinder incident response and auditing capabilities.
AI Analysis
Technical Summary
CVE-2026-28723 is an access control vulnerability (CWE-863) affecting Acronis Cyber Protect 17 on both Linux and Windows platforms prior to build 41186. The vulnerability allows an attacker with limited privileges to delete reports without proper authorization, due to insufficient access control mechanisms in the product. Specifically, the flaw enables unauthorized report deletion, which compromises the integrity of the system's audit and reporting functions. The CVSS v3.0 score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects only integrity (I:L), with no confidentiality or availability impact. No public exploits have been reported yet, but the vulnerability could be leveraged by insiders or attackers who have gained limited access to the system to cover tracks or disrupt forensic investigations. Acronis Cyber Protect 17 is widely used in enterprise environments for backup, disaster recovery, and cybersecurity management, making the integrity of its reporting functions critical for operational security and compliance. The vulnerability underscores the need for strict authorization checks on sensitive operations within security management tools.
Potential Impact
The primary impact of CVE-2026-28723 is the unauthorized deletion of reports, which undermines the integrity of audit logs and security reports generated by Acronis Cyber Protect 17. This can hinder incident response, forensic investigations, and compliance auditing by removing evidence of malicious activity or system events. Although confidentiality and availability are not directly affected, the loss of reliable reporting can lead to delayed detection of breaches and reduced trust in security monitoring. Organizations relying on Acronis Cyber Protect for backup and cybersecurity management may face increased risk of undetected intrusions or insider threats if attackers exploit this vulnerability to erase traces of their actions. The vulnerability is exploitable remotely with low privileges, increasing the attack surface. While no known exploits exist currently, the potential for misuse in targeted attacks or insider scenarios is significant, especially in environments with lax access controls or shared credentials.
Mitigation Recommendations
To mitigate CVE-2026-28723, organizations should: 1) Apply the official patch or update from Acronis as soon as it becomes available to ensure proper access control enforcement. 2) Restrict user privileges strictly following the principle of least privilege, ensuring that only authorized personnel have permissions to delete reports or perform sensitive operations. 3) Implement strong authentication and session management to prevent unauthorized access by low-privileged users. 4) Monitor and audit user activities related to report management to detect suspicious deletion attempts promptly. 5) Use network segmentation and firewall rules to limit access to the Acronis Cyber Protect management interfaces to trusted administrative networks. 6) Regularly back up audit logs and reports to secure, tamper-evident storage to preserve forensic evidence even if local reports are deleted. 7) Educate administrators about the risks of privilege escalation and the importance of safeguarding credentials. These measures collectively reduce the risk of exploitation and improve detection and response capabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Sweden, Switzerland
CVE-2026-28723: CWE-863 in Acronis Acronis Cyber Protect 17
Description
CVE-2026-28723 is a medium severity vulnerability in Acronis Cyber Protect 17 (Linux and Windows) before build 41186 that allows unauthorized deletion of reports due to insufficient access control (CWE-863). The flaw requires low privileges (PR:L) but no user interaction and can be exploited remotely (AV:N). While it does not impact confidentiality or availability, it compromises integrity by allowing unauthorized modification of report data. No known exploits are currently in the wild. Organizations relying on Acronis Cyber Protect 17 for backup and cybersecurity management should prioritize applying patches once available and implement strict access controls to mitigate risk. Countries with significant deployments of Acronis products, especially those with critical infrastructure and enterprise environments, are most at risk. This vulnerability highlights the importance of robust authorization checks in security management software to prevent unauthorized actions that could hinder incident response and auditing capabilities.
AI-Powered Analysis
Technical Analysis
CVE-2026-28723 is an access control vulnerability (CWE-863) affecting Acronis Cyber Protect 17 on both Linux and Windows platforms prior to build 41186. The vulnerability allows an attacker with limited privileges to delete reports without proper authorization, due to insufficient access control mechanisms in the product. Specifically, the flaw enables unauthorized report deletion, which compromises the integrity of the system's audit and reporting functions. The CVSS v3.0 score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects only integrity (I:L), with no confidentiality or availability impact. No public exploits have been reported yet, but the vulnerability could be leveraged by insiders or attackers who have gained limited access to the system to cover tracks or disrupt forensic investigations. Acronis Cyber Protect 17 is widely used in enterprise environments for backup, disaster recovery, and cybersecurity management, making the integrity of its reporting functions critical for operational security and compliance. The vulnerability underscores the need for strict authorization checks on sensitive operations within security management tools.
Potential Impact
The primary impact of CVE-2026-28723 is the unauthorized deletion of reports, which undermines the integrity of audit logs and security reports generated by Acronis Cyber Protect 17. This can hinder incident response, forensic investigations, and compliance auditing by removing evidence of malicious activity or system events. Although confidentiality and availability are not directly affected, the loss of reliable reporting can lead to delayed detection of breaches and reduced trust in security monitoring. Organizations relying on Acronis Cyber Protect for backup and cybersecurity management may face increased risk of undetected intrusions or insider threats if attackers exploit this vulnerability to erase traces of their actions. The vulnerability is exploitable remotely with low privileges, increasing the attack surface. While no known exploits exist currently, the potential for misuse in targeted attacks or insider scenarios is significant, especially in environments with lax access controls or shared credentials.
Mitigation Recommendations
To mitigate CVE-2026-28723, organizations should: 1) Apply the official patch or update from Acronis as soon as it becomes available to ensure proper access control enforcement. 2) Restrict user privileges strictly following the principle of least privilege, ensuring that only authorized personnel have permissions to delete reports or perform sensitive operations. 3) Implement strong authentication and session management to prevent unauthorized access by low-privileged users. 4) Monitor and audit user activities related to report management to detect suspicious deletion attempts promptly. 5) Use network segmentation and firewall rules to limit access to the Acronis Cyber Protect management interfaces to trusted administrative networks. 6) Regularly back up audit logs and reports to secure, tamper-evident storage to preserve forensic evidence even if local reports are deleted. 7) Educate administrators about the risks of privilege escalation and the importance of safeguarding credentials. These measures collectively reduce the risk of exploitation and improve detection and response capabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Acronis
- Date Reserved
- 2026-03-03T02:29:03.754Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 69aa1965c48b3f10ff8d2b84
Added to database: 3/6/2026, 12:01:41 AM
Last enriched: 3/6/2026, 12:18:17 AM
Last updated: 3/6/2026, 1:11:05 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.