CVE-2023-44210
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to access and manipulate sensitive information in Acronis Cyber Protect products due to a lack of proper authorization checks. It affects users running outdated versions of the software on Linux, macOS, or Windows, meaning that if your system isn't updated, it could be at risk.
Technical Description
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 29258, Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Oct 4, 2023
over 2 years ago
Last Modified
Mar 6, 2026
about 1 month ago
Vendor
acronis
Product
agent
Related Vulnerabilities
This vulnerability allows an attacker to access sensitive information from Acronis Cyber Protect products without proper authorization. It affects versions prior to specific builds, meaning that if your software isn't updated, an attacker could potentially view confidential data on your system.
This vulnerability allows an attacker to access sensitive information from Acronis Cyber Protect products due to a lack of proper authorization controls. It affects versions prior to specific builds, meaning that if your software is outdated, an attacker could exploit this flaw to retrieve confidential data without permission.
This vulnerability allows an attacker with local access to a system to gain higher privileges than they should have, potentially letting them control the system or access sensitive data. It affects specific versions of Acronis Cyber Protect products before certain builds, meaning attackers need to be able to log into the system first to exploit it.
This vulnerability allows an attacker to run their own commands on a Windows system by tricking McAfee Agent into executing a malicious file. To exploit it, the attacker needs local access to the machine and must place a specially crafted file in the right folder, which can then lead to gaining higher privileges on the system.