Linux Vulnerability (CVE-2025-30416)
CVE-2025-30416
Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Li...
Overview
A critical security vulnerability has been identified in Acronis Cyber Protect software that could allow an unauthenticated attacker to access and manipulate sensitive data. This flaw is due to a missing authorization check in the software’s web interface.
Vulnerability Details
In simple terms, the affected Acronis software versions do not properly verify a user’s identity and permissions for certain functions. This oversight creates a backdoor where an attacker, without needing a valid username or password, can directly interact with the management interface. Once connected, they can perform actions that should be restricted to authorized administrators only.
Affected Products
- Acronis Cyber Protect 16 (Linux and Windows versions) - all builds prior to build 39938
- Acronis Cyber Protect 15 (Linux and Windows versions) - all builds prior to build 41800
Potential Impact
The impact of this vulnerability is severe. A successful exploit could lead to:
- Data Disclosure: An attacker could access, view, and exfiltrate sensitive backup data, system information, and configuration details.
- Data Manipulation: An attacker could modify or delete existing backup data, potentially rendering recovery points useless.
- System Compromise: By manipulating configurations or backup jobs, an attacker could disrupt operations or create a foothold for further attacks on the network.
Given that the vulnerability requires no authentication and can lead to full loss of confidentiality and integrity, it has received the maximum CVSS score of 10.0 (CRITICAL).
Remediation and Mitigation
Immediate action is required for all affected installations.
Primary Remediation: The only complete solution is to update your Acronis Cyber Protect software to a patched version.
- For Acronis Cyber Protect 16, update to build 39938 or later.
- For Acronis Cyber Protect 15, update to build 41800 or later.
Mitigation Steps (If Immediate Patching is Not Possible):
- Restrict Network Access: Ensure the management interface of the Acronis server is not accessible from the public internet. Use firewall rules to restrict access to the necessary administrative IP addresses only.
- Monitor for Anomalies: Closely monitor the Acronis application logs for any unusual access attempts or configuration changes from unexpected sources.
- Verify Backups: Ensure you have recent, verified backups stored in a secure, offline location that is not accessible from the vulnerable system.
You should apply the official updates from Acronis as soon as possible during a maintenance window to fully eliminate this risk.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (...
Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (...
External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access....
Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially craf...
Other Windows Vulnerabilities
External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access....
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network....
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attack...
An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. `URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows th...