CVE-2025-30411
Improper Authentication in Acronis Cyber Protect Causes Data Exposure
Publication date: 2026-02-20
Last updated on: 2026-03-12
Assigner: Acronis International GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| acronis | cyber_protect | 15 |
| acronis | cyber_protect | 15 |
| acronis | cyber_protect | 15 |
| acronis | cyber_protect | 15 |
| acronis | cyber_protect | 15 |
| acronis | cyber_protect | 15 |
| acronis | cyber_protect | 15 |
| acronis | cyber_protect | 16 |
| acronis | cyber_protect | 16 |
| acronis | cyber_protect | 16 |
| acronis | cyber_protect | 16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1390 | The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves sensitive data disclosure and manipulation caused by improper authentication mechanisms in certain versions of Acronis Cyber Protect 15 and 16. Essentially, the affected products do not properly verify user credentials, which allows unauthorized users to access and potentially alter sensitive information.
How can this vulnerability impact me? :
The impact of this vulnerability is severe, as indicated by its maximum CVSS score of 10.0. An attacker can remotely exploit this flaw without any privileges or user interaction, leading to complete compromise of confidentiality, integrity, and availability of the affected system. This means sensitive data can be disclosed or manipulated, potentially causing data breaches, loss of trust, and operational disruptions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know