CVE-2025-30413
Credential Persistence in Acronis Agent After Plan Revocation
Publication date: 2026-03-06
Last updated on: 2026-03-13
Assigner: Acronis International GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| acronis | cyber_protect | to 17.0.41186 (exc) |
| acronis | agent | to c25.07 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves credentials not being deleted from the Acronis Agent after a plan revocation. Specifically, affected products include Acronis Cyber Protect Cloud Agent and Acronis Cyber Protect 17 on Linux, macOS, and Windows platforms before certain build versions.
How can this vulnerability impact me? :
Because credentials remain on the system after a plan is revoked, unauthorized access or misuse of those credentials could occur, potentially leading to a confidentiality breach. The CVSS score indicates a moderate impact on confidentiality but no impact on integrity or availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know