The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-30413

CVE-2025-30413: Acronis Agent Auth Bypass Vulnerability

CVE-2025-30413 is an authentication bypass flaw in Acronis Cyber Protect Cloud Agent and Acronis Cyber Protect 17 where credentials persist after plan revocation. This article covers technical details, affected versions, and mitigation.

Published: March 13, 2026

CVE-2025-30413 Overview

CVE-2025-30413 is a credential management vulnerability affecting Acronis Cyber Protect products where credentials are not properly deleted from the Acronis Agent after plan revocation. This improper permission assignment flaw (CWE-732) allows local attackers with high privileges to potentially access sensitive credential information that should have been removed when protection plans are revoked.

Critical Impact

Sensitive credentials remain accessible on endpoints after protection plan revocation, potentially allowing privileged local users to harvest stored authentication data for unauthorized access to backup infrastructure.

Affected Products

  • Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 40497
  • Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186

Discovery Timeline

  • 2026-03-06 - CVE CVE-2025-30413 published to NVD
  • 2026-03-09 - Last updated in NVD database

Technical Details for CVE-2025-30413

Vulnerability Analysis

This vulnerability stems from improper credential lifecycle management within the Acronis Agent software. When a protection plan is revoked or removed from an endpoint, the associated credentials should be securely deleted from the local system. However, affected versions of Acronis Cyber Protect Cloud Agent and Acronis Cyber Protect 17 fail to properly clean up these credentials, leaving them accessible on the local file system.

The vulnerability is classified under CWE-732 (Incorrect Permission Assignment for Critical Resource), indicating that the stored credentials may not have appropriate access controls even while they remain on the system after plan revocation.

Root Cause

The root cause lies in the credential cleanup logic within the Acronis Agent. When protection plans are revoked through the management console, the agent fails to execute the necessary credential removal procedures. This results in orphaned credential data persisting on endpoints beyond their intended lifecycle. The improper permission assignment aspect suggests these credentials may also be stored with insufficient access restrictions, compounding the risk.

Attack Vector

The vulnerability requires local access to the affected system and high privileges to exploit. An attacker with administrative access to an endpoint running a vulnerable Acronis Agent could:

  1. Identify endpoints where protection plans have been previously revoked
  2. Locate the residual credential storage locations used by the Acronis Agent
  3. Extract stored credentials that should have been deleted
  4. Use harvested credentials to potentially access Acronis backup infrastructure or pivot to other protected systems

This attack requires physical or remote administrative access to the vulnerable endpoint, limiting the attack surface to insider threats or post-compromise scenarios where an attacker has already gained elevated privileges.

Detection Methods for CVE-2025-30413

Indicators of Compromise

  • Unexpected access to Acronis Agent credential storage directories by unauthorized processes
  • Anomalous authentication attempts to Acronis management infrastructure using revoked credentials
  • File system access patterns targeting Acronis configuration and credential files after plan revocation events
  • Audit log entries showing credential file reads without corresponding active protection plans

Detection Strategies

  • Monitor file system access to Acronis Agent installation directories, particularly after plan revocation events
  • Implement endpoint detection rules to alert on processes reading Acronis credential files outside of normal backup operations
  • Correlate Acronis management console events with endpoint file access logs to identify credential access after revocation
  • Deploy SentinelOne Singularity to detect suspicious process behaviors targeting backup agent credential stores

Monitoring Recommendations

  • Enable verbose logging on Acronis Agent installations to track credential management operations
  • Configure SIEM rules to correlate protection plan revocation events with subsequent credential file access
  • Implement file integrity monitoring on Acronis Agent configuration directories
  • Review audit logs regularly for evidence of credential harvesting attempts on systems with revoked plans

How to Mitigate CVE-2025-30413

Immediate Actions Required

  • Update Acronis Cyber Protect Cloud Agent to build 40497 or later immediately
  • Update Acronis Cyber Protect 17 to build 41186 or later on all platforms (Linux, macOS, Windows)
  • Audit all systems where protection plans have been previously revoked to identify potential credential exposure
  • Rotate any credentials that may have been stored on systems with revoked plans prior to patching

Patch Information

Acronis has released security updates addressing this vulnerability. Refer to the official security advisories for detailed patch information:

  • Acronis Security Advisory SEC-9386
  • Acronis Security Advisory SEC-8658

Organizations should prioritize upgrading to the patched builds: Acronis Cyber Protect Cloud Agent build 40497 or later, and Acronis Cyber Protect 17 build 41186 or later.

Workarounds

  • Manually verify and remove credential files from Acronis Agent directories after revoking protection plans on unpatched systems
  • Restrict local administrative access to minimize the pool of users who could exploit residual credentials
  • Implement additional access controls on Acronis Agent installation directories to limit credential file access
  • Consider temporarily removing Acronis Agent software entirely from systems where protection plans are revoked until patching is complete
bash
# Configuration example
# Verify Acronis Agent build version on Windows
reg query "HKLM\SOFTWARE\Acronis\BackupAndRecovery" /v BuildNumber

# Verify Acronis Agent build version on Linux
cat /usr/lib/Acronis/BackupAndRecovery/version.txt

# Restrict permissions on Acronis credential directories (Linux example)
chmod 700 /var/lib/Acronis/BackupAndRecovery/
chown root:root /var/lib/Acronis/BackupAndRecovery/

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechAcronis

  • SeverityMEDIUM

  • CVSS Score4.4

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-732
  • Technical References
  • Acronis Security Advisory SEC-9386

  • Acronis Security Advisory SEC-8658
  • Related CVEs
  • CVE-2025-11790: Acronis Agent Auth Bypass Vulnerability

  • CVE-2026-28713: Acronis Cyber Protect Auth Bypass Flaw

  • CVE-2025-30416: Acronis Cyber Protect Auth Bypass Flaw

  • CVE-2025-11792: Acronis Cyber Protect Cloud DLL Hijacking
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English