Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
cyber_protect Vendor: acronis

About This Product

cyber_protect is a software product offered by acronis. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 86 known vulnerabilities affecting acronis cyber_protect. This includes 7 critical-severity issues and 41 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2020 to 2026, indicating a sustained research interest and ongoing security attention. 38 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-10138 2020-10-21 2024-11-21 7.8 7.2 Unknown
CVE-2020-35556 2021-02-22 2024-11-21 7.5 5.0 Likely
CVE-2020-35664 2021-02-22 2024-11-21 6.1 4.3 Likely
CVE-2021-38086 2021-08-12 2024-11-21 7.8 4.4 Unknown
CVE-2021-38087 2021-08-12 2024-11-21 6.1 4.3 Likely
CVE-2021-38088 2021-08-12 2024-11-21 7.8 4.6 Unknown
CVE-2021-44198 2021-11-29 2024-11-21 7.8 4.4 Unknown
CVE-2021-44199 2021-11-29 2024-11-21 5.5 1.9 Unknown
CVE-2021-44200 2021-11-29 2024-11-21 5.4 3.5 Unknown
CVE-2021-44201 2021-11-29 2024-11-21 6.1 4.3 Likely
CVE-2021-44202 2021-11-29 2024-11-21 5.4 3.5 Unknown
CVE-2021-44203 2021-11-29 2024-11-21 5.4 3.5 Unknown
CVE-2021-44204 2022-02-04 2024-11-21 7.8 4.6 Unknown
CVE-2022-24113 2022-02-04 2024-11-21 7.8 4.6 Unknown
CVE-2022-30990 2022-05-18 2024-11-21 7.5 5.0 Likely
CVE-2022-30991 2022-05-18 2024-11-21 6.1 4.3 Likely
CVE-2022-30992 2022-05-18 2024-11-21 6.1 5.8 Likely
CVE-2022-30993 2022-05-18 2024-11-21 7.5 5.0 Likely
CVE-2022-30994 2022-05-18 2024-11-21 7.5 5.0 Likely
CVE-2022-45454 2023-02-13 2024-11-21 7.5 - -
CVE-2022-45455 2023-02-13 2024-11-21 7.8 - -
CVE-2022-30995 2023-05-03 2024-11-21 7.5 - -
CVE-2022-3405 2023-05-03 2024-11-21 8.8 - -
CVE-2022-45450 2023-05-18 2024-11-21 7.5 - -
CVE-2022-45452 2023-05-18 2024-11-21 7.8 - -
CVE-2022-45453 2023-05-18 2024-11-21 7.5 - -
CVE-2022-45457 2023-05-18 2024-11-21 7.5 - -
CVE-2022-45458 2023-05-18 2024-11-21 7.5 - -
CVE-2022-45459 2023-05-18 2024-11-21 7.5 - -
CVE-2022-45451 2023-08-31 2024-11-21 7.8 - -
CVE-2023-41742 2023-08-31 2024-11-21 7.5 - -
CVE-2023-41743 2023-08-31 2024-11-21 7.8 - -
CVE-2023-41744 2023-08-31 2024-11-21 7.8 - -
CVE-2023-41745 2023-08-31 2024-11-21 5.5 - -
CVE-2023-41749 2023-08-31 2024-11-21 7.5 - -
CVE-2023-44152 2023-09-27 2024-11-21 9.1 - -
CVE-2023-44153 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44154 2023-09-27 2024-11-21 8.1 - -
CVE-2023-44155 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44156 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44157 2023-09-27 2024-11-21 7.8 - -
CVE-2023-44158 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44159 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44160 2023-09-27 2024-11-21 6.5 - -
CVE-2023-44161 2023-09-27 2024-11-21 6.5 - -
CVE-2023-44205 2023-09-27 2024-11-21 5.3 - -
CVE-2023-44206 2023-09-27 2024-11-21 9.1 - -
CVE-2023-44207 2023-09-27 2024-11-21 5.4 - -
CVE-2023-48678 2024-02-27 2025-02-06 5.5 - -
CVE-2023-48679 2024-02-27 2025-02-06 5.4 - -
CVE-2023-48680 2024-02-27 2025-02-06 5.5 - -
CVE-2023-48681 2024-02-27 2025-02-06 6.1 - -
CVE-2023-48682 2024-02-27 2025-02-06 5.4 - -
CVE-2022-45449 2024-07-16 2025-03-07 6.5 - -
CVE-2024-49382 2024-10-15 2025-02-04 4.3 - -
CVE-2024-49383 2024-10-15 2025-02-04 4.3 - -
CVE-2024-49384 2024-10-15 2025-02-04 4.3 - -
CVE-2024-49387 2024-10-15 2025-02-04 7.5 - -
CVE-2024-49388 2024-10-15 2025-02-04 9.1 - -
CVE-2024-55540 2025-01-02 2025-03-06 7.8 - -
CVE-2024-55541 2025-01-02 2025-03-06 6.1 - -
CVE-2024-55543 2025-01-02 2025-03-06 7.8 - -
CVE-2025-30411 2026-02-20 2026-03-12 10.0 - -
CVE-2025-30412 2026-02-20 2026-03-12 10.0 - -
CVE-2025-30416 2026-02-20 2026-03-12 10.0 - -
CVE-2025-11791 2026-03-06 2026-03-13 7.1 - -
CVE-2025-30413 2026-03-06 2026-03-13 4.4 - -
CVE-2026-28709 2026-03-06 2026-03-12 4.3 - -
CVE-2026-28710 2026-03-06 2026-03-12 9.8 - -
CVE-2026-28711 2026-03-06 2026-03-11 6.3 - -
CVE-2026-28712 2026-03-06 2026-03-11 6.3 - -
CVE-2026-28713 2026-03-06 2026-03-13 7.1 - -
CVE-2026-28714 2026-03-06 2026-03-13 4.8 - -
CVE-2026-28715 2026-03-06 2026-03-12 6.5 - -
CVE-2026-28716 2026-03-06 2026-03-12 4.4 - -
CVE-2026-28717 2026-03-06 2026-03-11 5.0 - -
CVE-2026-28718 2026-03-06 2026-03-12 7.5 - -
CVE-2026-28719 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28720 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28721 2026-03-06 2026-03-11 7.3 - -
CVE-2026-28722 2026-03-06 2026-03-11 7.3 - -
CVE-2026-28723 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28724 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28725 2026-03-06 2026-03-13 5.5 - -
CVE-2026-28726 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28727 2026-03-06 2026-03-13 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for acronis cyber_protect by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.