Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.
Max CVSS
9.8
EPSS Score
0.11%
Published
2023-08-31
Updated
2023-09-06
Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.
Max CVSS
9.8
EPSS Score
0.11%
Published
2023-08-31
Updated
2023-09-06
Code execution and sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
Max CVSS
9.3
EPSS Score
0.06%
Published
2023-05-03
Updated
2023-05-09
Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
Max CVSS
9.3
EPSS Score
0.09%
Published
2023-05-03
Updated
2023-05-09
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
Max CVSS
9.1
EPSS Score
0.09%
Published
2023-09-27
Updated
2023-09-28
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Max CVSS
9.1
EPSS Score
0.09%
Published
2023-09-27
Updated
2023-09-28
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.
Max CVSS
9.1
EPSS Score
0.09%
Published
2023-10-04
Updated
2023-10-05
Acronis True Image up to and including version 2017 Build 8053 performs software updates using HTTP. Downloaded updates are only verified using a server-provided MD5 hash.
Max CVSS
8.8
EPSS Score
0.08%
Published
2017-06-21
Updated
2019-10-09
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.
Max CVSS
8.8
EPSS Score
0.04%
Published
2023-08-31
Updated
2023-09-06
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.
Max CVSS
8.8
EPSS Score
0.04%
Published
2023-08-31
Updated
2023-09-06
Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation.
Max CVSS
8.1
EPSS Score
0.14%
Published
2021-08-05
Updated
2021-08-12
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Max CVSS
8.1
EPSS Score
0.05%
Published
2023-09-27
Updated
2023-10-26
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe exposes a REST API that can be used by everyone, even unprivileged users. This API is used to communicate from the GUI to anti_ransomware_service.exe. This can be exploited to add an arbitrary malicious executable to the whitelist, or even exclude an entire drive from being monitored by anti_ransomware_service.exe.
Max CVSS
7.8
EPSS Score
0.09%
Published
2021-05-25
Updated
2021-05-28
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API.
Max CVSS
7.8
EPSS Score
0.09%
Published
2021-05-25
Updated
2022-07-12
Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
Max CVSS
7.8
EPSS Score
0.04%
Published
2020-10-21
Updated
2021-12-20
Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
Max CVSS
7.8
EPSS Score
0.04%
Published
2020-10-21
Updated
2021-12-20
Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis.
Max CVSS
7.8
EPSS Score
0.04%
Published
2020-10-21
Updated
2020-10-22
Acronis True Image 2019 update 1 through 2020 on macOS allows local privilege escalation due to an insecure XPC service configuration.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-07-15
Updated
2022-07-12
Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-07-15
Updated
2021-07-26

CVE-2020-25736

Public exploit
Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration.
Max CVSS
7.8
EPSS Score
0.05%
Published
2021-07-15
Updated
2023-03-03
Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue.
Max CVSS
7.8
EPSS Score
0.07%
Published
2021-01-29
Updated
2021-07-21
Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 1 of 2).
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-08-05
Updated
2021-08-12
Acronis True Image prior to 2021 Update 5 for Windows allowed local privilege escalation due to insecure folder permissions.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-08-05
Updated
2022-05-03
Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2).
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-08-05
Updated
2021-08-12
Acronis True Image prior to 2021 Update 4 for Windows and Acronis True Image prior to 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-08-05
Updated
2021-08-12
124 vulnerabilities found
1 2 3 4 5
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!