CVE-2026-28713
Default Credentials in Acronis Cyber Protect VMware Agents
Publication date: 2026-03-06
Last updated on: 2026-03-13
Assigner: Acronis International GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| acronis | agent | to c23.12 (exc) |
| acronis | cyber_protect | to 17.0.41186 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1392 | The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves default credentials being set for a local privileged user in a Virtual Appliance. Specifically, it affects certain versions of Acronis Cyber Protect Cloud Agent (VMware) before build 36943 and Acronis Cyber Protect 17 (VMware) before build 41186.
How can this vulnerability impact me? :
The presence of default credentials for a local privileged user can allow unauthorized attackers to gain privileged access to the affected systems. This can lead to a high impact on confidentiality and integrity, and a low impact on availability, as indicated by the CVSS score.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know