Bug Bounties

Acronis

Powered by: 

Allows bounty splitting: 

Average time to first program response: 7

Average time to bounty awarded null: 145

Average time to report resolved: 3685

Handle acronis

Managed program: false

Name: Acronis

Offers bounties: true

Offers swag: false

Response efficiency percentage: 99

Submission state: open

Url: https://hackerone.com/acronis

Website: https://www.acronis.com

In scope:

  • Asset identifier: *-api-*.acronis.com
  • Asset type: URL
  • Availability requirement: high
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: *.5nine.com
  • Asset type: URL
  • Availability requirement: low
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: low
  • Max severity: critical



  • Asset identifier: *.acronis.com
  • Asset type: URL
  • Availability requirement: low
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: low
  • Max severity: critical



  • Asset identifier: *.acronis.work
  • Asset type: URL
  • Availability requirement: high
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: *.devicelock.com
  • Asset type: URL
  • Availability requirement: low
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: low
  • Max severity: critical



  • Asset identifier: 1118448159
  • Asset type: APPLE_STORE_APP_ID
  • Availability requirement: high
  • Confidentiality requirement: low
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Cyber Protect for [iOS](https://apps.apple.com/app/acronis-cyber-backup/id1118448159).
  • Integrity requirements: low
  • Max severity: critical



  • Asset identifier: 1192506963
  • Asset type: APPLE_STORE_APP_ID
  • Availability requirement: high
  • Confidentiality requirement: low
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Files Cloud for [iOS](https://apps.apple.com/us/app/files-cloud/id1192506963).
  • Integrity requirements: low
  • Max severity: critical



  • Asset identifier: 429704844
  • Asset type: APPLE_STORE_APP_ID
  • Availability requirement: high
  • Confidentiality requirement: low
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Files Advanced for [iOS](https://apps.apple.com/us/app/acronis-files-advanced/id429704844).
  • Integrity requirements: low
  • Max severity: critical



  • Asset identifier: 978342143
  • Asset type: APPLE_STORE_APP_ID
  • Availability requirement: high
  • Confidentiality requirement: low
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis True Image for [iOS](https://apps.apple.com/app/acronis-true-image-mobile/id978342143).
  • Integrity requirements: low
  • Max severity: critical



  • Asset identifier: Acronis Agent
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Availability requirement: medium
  • Confidentiality requirement: medium
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Agent is a client-side application for Acronis Cyber Protect that incorporates backup and cyber protection mechanisms. You may download versions for all supported platforms from [here](https://mc-beta-cloud.acronis.com/download/u/baas/4.0/).
  • Integrity requirements: low
  • Max severity: critical



  • Asset identifier: Acronis Cloud Manager
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Availability requirement: medium
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Cloud Manager provides advanced monitoring, management, migration, and recovery for Microsoft Cloud environments. You may request a trial by completing [registration](https://www.acronis.com/en-eu/products/cloud-manager/trial/).
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: Acronis Cyber Files
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Availability requirement: medium
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Cyber Files is a secure file sync and share solution that enables your team to collaborate, access company files, and share documents on any device. You may request a trial by completing [registration](https://www.acronis.com/en-eu/products/files/trial/).
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: Acronis Cyber Infrastructure
  • Asset type: OTHER
  • Availability requirement: medium
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Cyber Infrastructure unites software-defined compute, network and storage in a single, scalable product, designed for building private or public clouds. You can read more about it at [kb.acronis.com](https://kb.acronis.com/acronis-cyber-infrastructure). Please note that this asset is only available periodically during testing phases.
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: Acronis Cyber Protect
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Availability requirement: medium
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Cyber Protect is an on-premises cyber protection solution designed for business environments. You may request a trial by completing [registration](https://www.acronis.com/en-us/business/cyber-protect/trial/#/registration).
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: Acronis Cyber Protect Home Office (formerly Acronis True Image)
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Availability requirement: low
  • Confidentiality requirement: medium
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Cyber Protect Home Office is designed for protection of home computers. You may download a trial version [here](https://www.acronis.com/en-us/personal/computer-backup).
  • Integrity requirements: medium
  • Max severity: critical



  • Asset identifier: Acronis DeviceLock DLP
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Availability requirement: medium
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis DeviceLock DLP provides comprehensive endpoint data loss prevention. You may request a trial by completing [registration](https://www.acronis.com/en-us/products/devicelock/trial/).
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: Acronis Snap Deploy
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Availability requirement: medium
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Snap Deploy is designed to deploy and provision all of your servers and workstations at once. You may request a trial by completing [registration](https://www.acronis.com/en-us/products/snap-deploy/trial/).
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: Other Acronis Domains
  • Asset type: OTHER
  • Availability requirement: low
  • Confidentiality requirement: low
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: low
  • Max severity: medium



  • Asset identifier: Other Acronis executables
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Availability requirement: medium
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: account.acronis.com
  • Asset type: URL
  • Availability requirement: high
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Customer Portal.
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: beta-cloud.acronis.com
  • Asset type: URL
  • Availability requirement: high
  • Confidentiality requirement: high
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Cyber Cloud beta environment. Request access by sending an email to security-bounty-accounts@acronis.com with `ACCOUNT-REQUEST:[username]` in subject. Make sure to provide your H1 username, not [email](https://docs.hackerone.com/hackers/hacker-email-alias.html). For instance, account request for user `acronis` should have the subject `ACCOUNT-REQUEST:acronis`.
  • Integrity requirements: high
  • Max severity: critical



  • Asset identifier: com.acronis.abc
  • Asset type: GOOGLE_PLAY_APP_ID
  • Availability requirement: medium
  • Confidentiality requirement: low
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis Cyber Protect for [Android](https://play.google.com/store/apps/details?id=com.acronis.abc).
  • Integrity requirements: medium
  • Max severity: critical



  • Asset identifier: com.acronis.acronistrueimage
  • Asset type: GOOGLE_PLAY_APP_ID
  • Availability requirement: medium
  • Confidentiality requirement: low
  • Eligible for bounty: true
  • Eligible for submissions: true
  • Instruction: Acronis True Image for [Android](https://play.google.com/store/apps/details?id=com.acronis.acronistrueimage).
  • Integrity requirements: medium
  • Max severity: critical