Acronis Cyber Protect: Numerous vulnerabilities endanger business software
Acronis is currently warning of more than 20 security vulnerabilities in Cyber Protect. Admins should promptly apply available updates.
(Image: heise online / dmk)
24 security vulnerabilities: Since Thursday this week, Acronis has published warning messages about this many vulnerabilities in Acronis Cyber Protect. Seven of them are considered high security risks.
Seven high-risk security vulnerabilities
On the overview page of Acronis security notices, the manufacturer lists the vulnerabilities. The following vulnerabilities stand out as the most serious:
- Security update of third-party dependencies (no CVE entries and CVSS values, but risk “high”) in Acronis Cyber Protect 17 (Linux, macOS, Windows) before Build 41186
- Sensitive information disclosure and manipulation due to improper authentication (CVE-2026-28710, CVSS 8.1, risk “high”) in Acronis Cyber Protect 17 (Linux, Windows) before Build 41186
- Local privilege escalation due to insecure Unix socket permissions (CVE-2026-28727, CVSS 7.8, risk “high”) in Acronis Cyber Protect 17 (macOS) before Build 41186 and Cloud Agent (macOS) before Build 41124
- Local privilege escalation due to improper soft link handling (CVE-2026-28722, CVSS 7.3, risk “high”) in Acronis Cyber Protect 17 (Windows) before Build 41186
- Local privilege escalation due to improper soft link handling (CVE-2026-28721, CVSS 7.3, risk “high”) in Acronis Cyber Protect 17 (Windows) before Build 41186
- Local privilege escalation due to DLL hijacking vulnerability (CVE-2025-11792, CVSS 7.3, risk “high”) in Acronis Cyber Protect Cloud Agent (Windows) before Build 41124
- Default credentials set for local privileged user in Virtual Appliance (CVE-2026-28713, CVSS 7.1, risk “high”) in Acronis Cyber Protect 17 (VMware) before Build 41186 and Cloud Agent (VMware) before Build 36943
The updated software versions have been available for download for months or even longer in some cases. Anyone using Acronis Cyber Protect in their infrastructure should therefore check if vulnerable versions are currently running and apply the updates if necessary.
Videos by heise
Most recently, in September, Acronis closed a security vulnerability in the Acronis Cyber Protect Cloud Agent for Windows, classified as high-risk.
(dmk)