Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28726: CWE-863 in Acronis Acronis Cyber Protect 17

0
Medium
VulnerabilityCVE-2026-28726cvecve-2026-28726cwe-863
Published: Thu Mar 05 2026 (03/05/2026, 23:57:23 UTC)
Source: CVE Database V5
Vendor/Project: Acronis
Product: Acronis Cyber Protect 17

Description

CVE-2026-28726 is a medium-severity vulnerability in Acronis Cyber Protect 17 (Linux and Windows versions before build 41186) caused by improper access control (CWE-863). This flaw allows an attacker with limited privileges to disclose sensitive information without requiring user interaction. The vulnerability does not affect system integrity or availability but can expose confidential data over the network. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize applying patches once available and review access control policies to mitigate risk. This vulnerability primarily impacts environments relying on Acronis Cyber Protect 17 for backup and cybersecurity management. Countries with significant deployments of Acronis products and critical infrastructure using this software are at higher risk. The CVSS 3. 0 base score is 4. 3, reflecting a medium severity due to network exploitability and limited impact scope.

AI-Powered Analysis

AILast updated: 03/06/2026, 00:30:25 UTC

Technical Analysis

CVE-2026-28726 is a vulnerability identified in Acronis Cyber Protect 17, a widely used backup and cybersecurity solution for both Linux and Windows platforms. The root cause is improper access control (CWE-863), which allows an attacker with some level of privileges (PR:L - privileges required) to access sensitive information that should otherwise be restricted. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N), increasing its risk profile. However, the attack complexity is low (AC:L), meaning it does not require sophisticated techniques to exploit once privileges are obtained. The vulnerability impacts confidentiality (C:L) but does not affect integrity or availability (I:N, A:N). The affected versions are those prior to build 41186, though specific version numbers are unspecified. No public exploits have been reported yet, but the presence of this flaw could allow attackers to gather sensitive data that might facilitate further attacks or data breaches. The vulnerability is classified as CWE-863, which involves improper authorization checks that fail to enforce correct access controls, leading to unauthorized information disclosure. Given the nature of Acronis Cyber Protect as a cybersecurity and backup tool, exposure of sensitive information could include backup metadata, system configurations, or security settings, which could be leveraged by attackers for lateral movement or privilege escalation.

Potential Impact

The primary impact of CVE-2026-28726 is unauthorized disclosure of sensitive information, which can compromise confidentiality within affected organizations. While it does not directly affect system integrity or availability, the leaked information could aid attackers in planning more damaging attacks such as privilege escalation, lateral movement, or targeted data exfiltration. Organizations relying on Acronis Cyber Protect 17 for backup and cybersecurity management may face increased risk of data exposure, potentially affecting compliance with data protection regulations. The vulnerability’s network exploitability and lack of required user interaction increase the likelihood of remote attacks, especially in environments where attackers have gained limited access privileges. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation. Overall, this vulnerability could undermine trust in backup and security infrastructure, leading to operational and reputational damage if exploited.

Mitigation Recommendations

Organizations should immediately identify all instances of Acronis Cyber Protect 17 deployed within their environments and verify the build version to determine exposure. Although no patch links are currently provided, monitoring Acronis official channels for updates or hotfixes is critical. In the interim, organizations should enforce strict access control policies, limiting user privileges to the minimum necessary to reduce the risk of exploitation. Network segmentation and firewall rules should restrict access to Acronis management interfaces to trusted administrators only. Implementing robust monitoring and logging around Acronis Cyber Protect components can help detect suspicious access attempts. Additionally, conducting regular audits of user permissions and reviewing backup data access policies will help mitigate unauthorized information disclosure. Organizations should also consider compensating controls such as multi-factor authentication for administrative access and encryption of sensitive backup data to reduce the impact of potential leaks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Acronis
Date Reserved
2026-03-03T02:29:03.754Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69aa1cc6c48b3f10ff8f955b

Added to database: 3/6/2026, 12:16:06 AM

Last enriched: 3/6/2026, 12:30:25 AM

Last updated: 3/6/2026, 1:22:26 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses