Security Advisory for Acronis Cyber Protect

9. November 2022

The analysts at usd HeroLab examined Acronis Cyber Protect application as part of their security analyses.

This revealed a vulnerability that allowed a potential attacker with network access to anonymously register with an Acronis Cyber Protect appliance. The attacker could use this access to gain access to the management interface and execute arbitrary commands on the appliance's host.

The vulnerability was reported to the vendor under the Responsible Disclosure Policy and was subsequently fixed. The advisory has been published in coordination with the vendor only now, in order to give the users of the application sufficient time to install the patched version. Detailed information about this advisory can be found here.

About usd HeroLab Security Advisories

In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.

We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues – always in line with our Responsible Disclosure Policy.

Always in the name of our mission: “more security.”

Also interesting:

Charity Runs 2023 - A Statement For Diversity And Solidarity

Charity Runs 2023 - A Statement For Diversity And Solidarity

This year, charity runs took place once again throughout Germany. The runs not only offer the opportunity to keep fit but also set a statement for diversity and solidarity. Organized by the usd Responsibility Circle, we supported our colleagues in their joint...

The Top 3 Security Aspects of Pentests in Automotive Cyber Security

The Top 3 Security Aspects of Pentests in Automotive Cyber Security

Connected Vehicles: Infotainment. Autonomous Driving. Cloud Backend. Amidst these developments, new opportunities are emerging for businesses, but also entirely new attack paths for cybercriminals. At the same time, they pose new challenges for cybersecurity...

NIS-2 and Dora: Why Two Pieces of EU Cybersecurity Legislation?

NIS-2 and Dora: Why Two Pieces of EU Cybersecurity Legislation?

Within a few months, the European Union has published two important pieces of legislation to strengthen cybersecurity: NIS-2 and DORA. Both are intended to strengthen companies in the financial sector and other businesses that are critical to the economy and society...

Categories

Categories