CVE Vulnerabilities

CVE-2025-30412

Weak Authentication

Published: Feb 20, 2026 | Modified: Mar 12, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

Weakness

The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.

Affected Software

NameVendorStart VersionEnd Version
Cyber_protectAcronis15 (including)15 (including)
Cyber_protectAcronis15-update1 (including)15-update1 (including)
Cyber_protectAcronis15-update2 (including)15-update2 (including)
Cyber_protectAcronis15-update3 (including)15-update3 (including)
Cyber_protectAcronis15-update4 (including)15-update4 (including)
Cyber_protectAcronis15-update5 (including)15-update5 (including)
Cyber_protectAcronis15-update6 (including)15-update6 (including)
Cyber_protectAcronis16 (including)16 (including)
Cyber_protectAcronis16-update1 (including)16-update1 (including)
Cyber_protectAcronis16-update2 (including)16-update2 (including)
Cyber_protectAcronis16-update3 (including)16-update3 (including)

Extended Description

Attackers may be able to bypass weak authentication faster and/or with less effort than expected.

References