Acronis Vulnerabilities
Comprehensive security vulnerability database for Acronis products
4
0
2
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2023-45243 | 5.5 | This vulnerability allows an attacker to access sensitive information from Acronis Cyber Protect products without proper authorization. It affects versions prior to specific builds, meaning that if your software isn't updated, an attacker could potentially view confidential data on your system. | acronisagent | Theoretical | over 2 years agoOct 5, 2023 |
| CVE-2023-45242 | 5.5 | This vulnerability allows an attacker to access sensitive information from Acronis Cyber Protect products due to a lack of proper authorization controls. It affects versions prior to specific builds, meaning that if your software is outdated, an attacker could exploit this flaw to retrieve confidential data without permission. | acronisagent | Exploit Available | over 2 years agoOct 5, 2023 |
| CVE-2023-44210 | 5.5 | This vulnerability allows an attacker to access and manipulate sensitive information in Acronis Cyber Protect products due to a lack of proper authorization checks. It affects users running outdated versions of the software on Linux, macOS, or Windows, meaning that if your system isn't updated, it could be at risk. | acronisagent | Exploit Available | over 2 years agoOct 4, 2023 |
| CVE-2023-44209 | 7.8 | This vulnerability allows an attacker with local access to a system to gain higher privileges than they should have, potentially letting them control the system or access sensitive data. It affects specific versions of Acronis Cyber Protect products before certain builds, meaning attackers need to be able to log into the system first to exploit it. | acronisagent | Theoretical | over 2 years agoOct 4, 2023 |
About Acronis Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Acronis products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.