Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

acronis

About This Vendor

acronis is a technology vendor producing software and infrastructure products. As a software provider, acronis's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of acronis's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 169 known vulnerabilities from acronis. This includes 11 critical-severity issues and 92 high-severity issues that represent significant risk. These vulnerabilities affect 18 distinct products across acronis's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2008 through 2026, indicating decades of continuous security attention and research. Organizations deploying acronis products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-1279 2008-03-10 2025-04-09 - 5.0 Likely
CVE-2008-1280 2008-03-10 2025-04-09 - 5.0 Likely
CVE-2008-1410 2008-03-20 2025-04-09 - 4.3 Likely
CVE-2008-1411 2008-03-20 2025-04-09 - 5.0 Likely
CVE-2008-3671 2008-08-13 2025-04-09 - 5.0 Likely
CVE-2017-3219 2017-06-21 2025-04-20 8.8 8.3 Unknown
CVE-2020-16171 2020-09-21 2024-11-21 6.5 6.4 Likely
CVE-2020-10138 2020-10-21 2024-11-21 7.8 7.2 Unknown
CVE-2020-10139 2020-10-21 2024-11-21 7.8 7.2 Unknown
CVE-2020-10140 2020-10-21 2024-11-21 7.8 6.9 Unknown
CVE-2020-35145 2021-01-29 2024-11-21 7.8 4.4 Unknown
CVE-2020-35556 2021-02-22 2024-11-21 7.5 5.0 Likely
CVE-2020-35664 2021-02-22 2024-11-21 6.1 4.3 Likely
CVE-2020-9450 2021-05-25 2024-11-21 7.8 4.6 Unknown
CVE-2020-9451 2021-05-25 2024-11-21 5.5 2.1 Unknown
CVE-2020-9452 2021-05-25 2024-11-21 7.8 7.2 Unknown
CVE-2020-15496 2021-07-15 2024-11-21 7.8 4.6 Unknown
CVE-2020-15495 2021-07-15 2024-11-21 7.8 4.6 Unknown
CVE-2020-25593 2021-07-15 2024-11-21 6.7 7.2 Unknown
CVE-2020-25736 2021-07-15 2024-11-21 7.8 4.6 Unknown
CVE-2020-14999 2021-07-30 2024-11-21 7.5 5.0 Likely
CVE-2021-32576 2021-08-05 2024-11-21 7.8 4.6 Unknown
CVE-2021-32577 2021-08-05 2024-11-21 7.8 4.6 Unknown
CVE-2021-32578 2021-08-05 2024-11-21 7.8 4.6 Unknown
CVE-2021-32579 2021-08-05 2024-11-21 7.8 4.6 Unknown
CVE-2021-32580 2021-08-05 2024-11-21 7.8 4.4 Unknown
CVE-2021-32581 2021-08-05 2024-11-21 8.1 5.8 Likely
CVE-2021-38086 2021-08-12 2024-11-21 7.8 4.4 Unknown
CVE-2021-38087 2021-08-12 2024-11-21 6.1 4.3 Likely
CVE-2021-38088 2021-08-12 2024-11-21 7.8 4.6 Unknown
CVE-2021-44198 2021-11-29 2024-11-21 7.8 4.4 Unknown
CVE-2021-44199 2021-11-29 2024-11-21 5.5 1.9 Unknown
CVE-2021-44200 2021-11-29 2024-11-21 5.4 3.5 Unknown
CVE-2021-44201 2021-11-29 2024-11-21 6.1 4.3 Likely
CVE-2021-44202 2021-11-29 2024-11-21 5.4 3.5 Unknown
CVE-2021-44203 2021-11-29 2024-11-21 5.4 3.5 Unknown
CVE-2021-34800 2021-11-29 2024-11-21 7.5 5.0 Likely
CVE-2021-44204 2022-02-04 2024-11-21 7.8 4.6 Unknown
CVE-2021-44205 2022-02-04 2024-11-21 7.3 4.4 Unknown
CVE-2021-44206 2022-02-04 2024-11-21 7.3 4.4 Unknown
CVE-2022-24113 2022-02-04 2024-11-21 7.8 4.6 Unknown
CVE-2022-24114 2022-02-04 2024-11-21 7.0 4.4 Unknown
CVE-2022-24115 2022-02-04 2024-11-21 7.8 4.6 Unknown
CVE-2022-0483 2022-02-11 2024-11-21 7.8 4.6 Unknown
CVE-2022-30695 2022-05-16 2024-11-21 7.8 4.6 Unknown
CVE-2022-30696 2022-05-16 2024-11-21 7.8 4.4 Unknown
CVE-2022-30697 2022-05-16 2024-11-21 7.8 4.6 Unknown
CVE-2022-30990 2022-05-18 2024-11-21 7.5 5.0 Likely
CVE-2022-30991 2022-05-18 2024-11-21 6.1 4.3 Likely
CVE-2022-30992 2022-05-18 2024-11-21 6.1 5.8 Likely
CVE-2022-30993 2022-05-18 2024-11-21 7.5 5.0 Likely
CVE-2022-30994 2022-05-18 2024-11-21 7.5 5.0 Likely
CVE-2022-44732 2022-11-07 2024-11-21 7.8 - -
CVE-2022-44733 2022-11-07 2024-11-21 7.8 - -
CVE-2022-44744 2022-11-07 2024-11-21 7.3 - -
CVE-2022-44745 2022-11-07 2024-11-21 5.5 - -
CVE-2022-44746 2022-11-07 2024-11-21 5.5 - -
CVE-2022-44747 2022-11-07 2024-11-21 7.8 - -
CVE-2022-45454 2023-02-13 2024-11-21 7.5 - -
CVE-2022-45455 2023-02-13 2024-11-21 7.8 - -
CVE-2022-45456 2023-04-26 2024-11-21 7.5 - -
CVE-2023-2355 2023-04-27 2024-11-21 7.8 - -
CVE-2023-2360 2023-04-28 2024-11-21 7.5 - -
CVE-2022-30995 2023-05-03 2024-11-21 7.5 - -
CVE-2022-3405 2023-05-03 2024-11-21 8.8 - -
CVE-2022-45450 2023-05-18 2024-11-21 7.5 - -
CVE-2022-45452 2023-05-18 2024-11-21 7.8 - -
CVE-2022-45453 2023-05-18 2024-11-21 7.5 - -
CVE-2022-45457 2023-05-18 2024-11-21 7.5 - -
CVE-2022-45458 2023-05-18 2024-11-21 7.5 - -
CVE-2022-45459 2023-05-18 2024-11-21 7.5 - -
CVE-2022-4418 2023-05-18 2024-11-21 7.8 - -
CVE-2023-2782 2023-05-18 2024-11-21 5.5 - -
CVE-2022-45451 2023-08-31 2024-11-21 7.8 - -
CVE-2022-46868 2023-08-31 2024-11-21 7.8 - -
CVE-2023-41742 2023-08-31 2024-11-21 7.5 - -
CVE-2023-41743 2023-08-31 2024-11-21 7.8 - -
CVE-2023-41744 2023-08-31 2024-11-21 7.8 - -
CVE-2023-41745 2023-08-31 2024-11-21 5.5 - -
CVE-2023-41746 2023-08-31 2024-11-21 9.8 - -
CVE-2023-41747 2023-08-31 2025-05-05 6.5 - -
CVE-2023-41748 2023-08-31 2024-11-21 9.8 - -
CVE-2022-46869 2023-08-31 2024-11-21 7.8 - -
CVE-2023-41749 2023-08-31 2024-11-21 7.5 - -
CVE-2023-41750 2023-08-31 2024-11-21 5.5 - -
CVE-2023-41751 2023-08-31 2024-11-21 5.5 - -
CVE-2023-4688 2023-08-31 2024-11-21 5.5 - -
CVE-2023-5042 2023-09-20 2024-11-21 7.5 - -
CVE-2023-44152 2023-09-27 2024-11-21 9.1 - -
CVE-2023-44153 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44154 2023-09-27 2024-11-21 8.1 - -
CVE-2023-44155 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44156 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44157 2023-09-27 2024-11-21 7.8 - -
CVE-2023-44158 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44159 2023-09-27 2024-11-21 7.5 - -
CVE-2023-44160 2023-09-27 2024-11-21 6.5 - -
CVE-2023-44161 2023-09-27 2024-11-21 6.5 - -
CVE-2023-44205 2023-09-27 2024-11-21 5.3 - -
CVE-2023-44206 2023-09-27 2024-11-21 9.1 - -
CVE-2023-44207 2023-09-27 2024-11-21 5.4 - -
CVE-2023-44208 2023-10-04 2024-11-21 9.1 - -
CVE-2023-44209 2023-10-04 2026-03-06 7.8 - -
CVE-2023-44210 2023-10-04 2026-03-06 5.5 - -
CVE-2023-44211 2023-10-05 2024-11-21 7.1 - -
CVE-2023-44212 2023-10-05 2024-11-21 7.1 - -
CVE-2023-44213 2023-10-05 2024-11-21 5.5 - -
CVE-2023-44214 2023-10-05 2024-11-21 5.5 - -
CVE-2023-45240 2023-10-05 2024-11-21 5.5 - -
CVE-2023-45241 2023-10-05 2024-11-21 5.5 - -
CVE-2023-45242 2023-10-05 2026-03-06 5.5 - -
CVE-2023-45243 2023-10-05 2026-03-06 5.5 - -
CVE-2023-45244 2023-10-06 2024-11-21 7.1 - -
CVE-2023-45245 2023-10-06 2024-11-21 5.5 - -
CVE-2023-45246 2023-10-06 2025-01-02 7.1 - -
CVE-2023-45247 2023-10-09 2025-01-02 7.1 - -
CVE-2023-45248 2023-10-09 2024-11-21 7.3 - -
CVE-2023-48677 2023-12-12 2025-06-04 7.8 - -
CVE-2023-48676 2023-12-14 2025-05-01 7.1 - -
CVE-2023-48678 2024-02-27 2025-02-06 5.5 - -
CVE-2023-48679 2024-02-27 2025-02-06 5.4 - -
CVE-2023-48680 2024-02-27 2025-02-06 5.5 - -
CVE-2023-48681 2024-02-27 2025-02-06 6.1 - -
CVE-2023-48682 2024-02-27 2025-02-06 5.4 - -
CVE-2024-34012 2024-06-14 2024-11-21 4.4 - -
CVE-2022-45449 2024-07-16 2025-03-07 6.5 - -
CVE-2023-45249 2024-07-24 2025-10-22 9.8 - -
CVE-2024-34017 2024-08-29 2024-09-12 7.3 - -
CVE-2024-34018 2024-08-29 2024-09-12 5.5 - -
CVE-2024-34019 2024-08-29 2024-09-12 7.3 - -
CVE-2024-49382 2024-10-15 2025-02-04 4.3 - -
CVE-2024-49383 2024-10-15 2025-02-04 4.3 - -
CVE-2024-49384 2024-10-15 2025-02-04 4.3 - -
CVE-2024-49387 2024-10-15 2025-02-04 7.5 - -
CVE-2024-49388 2024-10-15 2025-02-04 9.1 - -
CVE-2024-49386 2024-10-17 2024-10-18 5.7 - -
CVE-2024-49389 2024-10-17 2024-10-18 7.8 - -
CVE-2024-49390 2024-10-17 2024-10-18 7.3 - -
CVE-2024-49391 2024-10-17 2024-10-18 7.3 - -
CVE-2024-49392 2024-10-17 2024-10-18 4.8 - -
CVE-2024-55540 2025-01-02 2025-03-06 7.8 - -
CVE-2024-55541 2025-01-02 2025-03-06 6.1 - -
CVE-2024-55543 2025-01-02 2025-03-06 7.8 - -
CVE-2025-30411 2026-02-20 2026-03-12 10.0 - -
CVE-2025-30412 2026-02-20 2026-03-12 10.0 - -
CVE-2025-30416 2026-02-20 2026-03-12 10.0 - -
CVE-2025-11790 2026-03-06 2026-03-13 4.4 - -
CVE-2025-11791 2026-03-06 2026-03-13 7.1 - -
CVE-2025-11792 2026-03-06 2026-03-13 7.3 - -
CVE-2025-30413 2026-03-06 2026-03-13 4.4 - -
CVE-2026-28709 2026-03-06 2026-03-12 4.3 - -
CVE-2026-28710 2026-03-06 2026-03-12 9.8 - -
CVE-2026-28711 2026-03-06 2026-03-11 6.3 - -
CVE-2026-28712 2026-03-06 2026-03-11 6.3 - -
CVE-2026-28713 2026-03-06 2026-03-13 7.1 - -
CVE-2026-28714 2026-03-06 2026-03-13 4.8 - -
CVE-2026-28715 2026-03-06 2026-03-12 6.5 - -
CVE-2026-28716 2026-03-06 2026-03-12 4.4 - -
CVE-2026-28717 2026-03-06 2026-03-11 5.0 - -
CVE-2026-28718 2026-03-06 2026-03-12 7.5 - -
CVE-2026-28719 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28720 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28721 2026-03-06 2026-03-11 7.3 - -
CVE-2026-28722 2026-03-06 2026-03-11 7.3 - -
CVE-2026-28723 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28724 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28725 2026-03-06 2026-03-13 5.5 - -
CVE-2026-28726 2026-03-06 2026-03-13 4.3 - -
CVE-2026-28727 2026-03-06 2026-04-02 7.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for acronis by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with acronis's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.