Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28724: CWE-863 in Acronis Acronis Cyber Protect 17

0
Medium
VulnerabilityCVE-2026-28724cvecve-2026-28724cwe-863
Published: Thu Mar 05 2026 (03/05/2026, 23:55:51 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 17

Description

Unauthorized data access due to insufficient access control validation. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:53:03 UTC

Technical Analysis

CVE-2026-28724 is a vulnerability identified in Acronis Cyber Protect 17, affecting both Linux and Windows versions prior to build 41186. The root cause is insufficient access control validation (CWE-863), which means the software fails to properly verify whether a user has the necessary permissions before granting access to certain data. This flaw can be exploited by users who already have some level of privilege (not full administrative rights) to gain unauthorized access to data that should be restricted. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its potential attack surface. However, the requirement for some privileges limits the ease of exploitation. The vulnerability impacts confidentiality by potentially exposing sensitive backup or protected data, but it does not affect data integrity or system availability. No known exploits have been reported in the wild, and no official patches have been linked at the time of publication. Acronis Cyber Protect is a widely used backup and cyber protection solution, making this vulnerability relevant to organizations relying on it for data protection and disaster recovery. The CVSS v3.0 score of 4.3 (medium severity) reflects the limited scope and impact but highlights the need for timely mitigation. Organizations should audit their access control configurations and monitor for suspicious access patterns until a patch is available.

Potential Impact

The primary impact of CVE-2026-28724 is unauthorized disclosure of sensitive data managed or protected by Acronis Cyber Protect 17. Since the product is used for backup and cyber protection, unauthorized access could expose backup data, potentially including sensitive corporate information, personally identifiable information (PII), or intellectual property. This could lead to privacy violations, regulatory non-compliance, and increased risk of further attacks if attackers gain insight into backup contents or configurations. The vulnerability does not affect data integrity or availability, so it does not directly enable data tampering or service disruption. However, the confidentiality breach alone can have significant reputational and operational consequences. The requirement for some privileges to exploit reduces the risk from external attackers but raises concerns about insider threats or compromised accounts with limited access. Organizations worldwide using Acronis Cyber Protect 17 in critical environments could face data exposure risks until the vulnerability is remediated.

Mitigation Recommendations

1. Immediately review and tighten access control policies within Acronis Cyber Protect 17 environments to ensure users have only the minimum necessary privileges. 2. Implement strict role-based access control (RBAC) and audit user permissions regularly to detect and remove excessive privileges. 3. Monitor logs and access patterns for unusual or unauthorized data access attempts, especially from accounts with limited privileges. 4. Isolate backup management interfaces from general network access using network segmentation and firewall rules to reduce exposure. 5. Until an official patch is released, consider restricting access to the Acronis Cyber Protect management consoles and APIs to trusted administrators only. 6. Stay informed through Acronis security advisories for the release of patches or updates addressing this vulnerability and apply them promptly. 7. Employ multi-factor authentication (MFA) for all accounts with access to Acronis Cyber Protect to reduce the risk of credential compromise. 8. Conduct internal penetration testing or vulnerability assessments focusing on access control weaknesses in backup and protection systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2026-03-03T02:29:03.754Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69aa1965c48b3f10ff8d2b87

Added to database: 3/6/2026, 12:01:41 AM

Last enriched: 3/13/2026, 7:53:03 PM

Last updated: 4/20/2026, 5:05:52 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses