First published: Tue Oct 15 2024(Updated: )
Excessive attack surface in archive-server service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
Credit: security@acronis.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Acronis Cyber Protect | <=15 | |
Acronis Cyber Protect | =16 | |
Acronis Cyber Protect | =16-update1 | |
Any of | ||
Linux Kernel | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49382 has been classified with a critical severity rating due to the excessive attack surface it creates.
To mitigate CVE-2024-49382, ensure that the Acronis Cyber Protect service is configured to bind only to specific, restricted IP addresses.
CVE-2024-49382 affects Acronis Cyber Protect 16 on both Linux and Windows platforms prior to build 38690.
CVE-2024-49382 was disclosed in 2024, highlighting issues in the archive-server service.
Currently, the best workaround for CVE-2024-49382 is to restrict the binding of the affected service to specific IP addresses until an update is applied.