Skip to content
Threat Feed
high advisory

Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation

Multiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.

Multiple vulnerabilities exist within the Acronis Cyber Protect Cloud Agent that could allow an authenticated attacker, either locally or remotely, to escalate their privileges. The vulnerabilities are within the core functionality of the Acronis agent, and successful exploitation could lead to elevated access within the target system. The advisory does not specify the exact nature of the vulnerabilities, but the potential impact of privilege escalation is significant for defenders, as it allows attackers to perform actions they would normally be restricted from doing, such as installing software, modifying data, and accessing sensitive information.

Attack Chain

  1. An attacker gains initial access to a system with a valid, but low-privileged, account. This could be achieved through phishing, compromised credentials, or other means.
  2. The attacker identifies a vulnerable version of the Acronis Cyber Protect Cloud Agent running on the system.
  3. The attacker leverages one of the unspecified vulnerabilities within the Acronis agent through local interaction with the Acronis agent service.
  4. Successful exploitation of the vulnerability allows the attacker to bypass access controls and execute code with elevated privileges.
  5. The attacker uses their newly acquired privileges to install malicious software, such as a keylogger or remote access trojan.
  6. The attacker uses their privileges to access sensitive data, such as user credentials, financial records, or intellectual property.
  7. The attacker establishes persistence on the system by creating a new privileged account or modifying existing system configurations.
  8. The attacker uses the compromised system as a pivot point to further compromise other systems within the network.

Impact

Successful exploitation of these vulnerabilities could allow attackers to gain complete control over affected systems. The number of potential victims is widespread, as Acronis Cyber Protect Cloud Agent is used by numerous organizations for data protection and backup purposes. If an attacker successfully escalates privileges, they can steal sensitive data, install malware, disrupt critical services, and compromise the entire network. The consequences could include significant financial losses, reputational damage, and legal liabilities.

Recommendation

  • Monitor for suspicious processes spawned by the Acronis Cyber Protect Cloud Agent that do not align with normal activity.
  • Implement the Sigma rule SuspiciousAcronisChildProcess to detect unusual child processes spawned by the Acronis agent.
  • Investigate any unauthorized modifications to system configurations or user accounts, particularly those performed by the Acronis Cyber Protect Cloud Agent using the RegistryModificationByAcronis Sigma rule.
  • Apply the latest patches and updates to Acronis Cyber Protect Cloud Agent as soon as they become available from the vendor.

Detection coverage 2

Suspicious Acronis Child Process

high

Detects unusual child processes spawned by the Acronis Cyber Protect Cloud Agent, which may indicate privilege escalation.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Registry Modification By Acronis

medium

Detects unauthorized modifications to system configurations or user accounts performed by the Acronis Cyber Protect Cloud Agent.

sigma tactics: persistence techniques: T1547.001 sources: registry_set, windows

Detection queries are kept inside the platform. Get full rules →