AMS User stored in Plain text in Registry LSA Secrets folder
Hi,
I'm not an Acronis engineer, but our customer is running Acronis Cyber Protect 15.0.30984.
We have just had a security test and one of the things that came from that was some systems having their passwords stored in plain text in the registry (LSA Secrets). Sadly that is true for the Acronis server, which shows both "Acronis Cyber protect Management Server" and "Acronis Service Manager Service" running as ".\ams user" and having their creds stored in plain text in the registry.
This is a new(ish) 2016 server, built 6 months ago for Acronis. There is no policy in place to enforce creds to be stored in plain text in the registry (reversible encryption) so this must be something that Acronis is doing to have created the creds in this way.
Is this a known issue with Acronis and is it being fixed? Or even better is there a fix I am missing?
What are our options for changing the password on this user? Doable? It's just a local user with a randomly generated password. I'm sure I would be able to reset this in local users, I can then update the password in the 2 services which should cause it to store correctly (hopefully). However, what would that break within Acronis?
Is is possible / recommended to change the local AMS USER to be a domain account? If so, aside from taking ownership of the Masterkey.local file, what else would I need to do to change this?
I have a deadline of next Wednesday to get this remediated or the customer will fail their security testing. So any ideas to resolve this would be very welcome.
Cheers
James

- Log in to post comments