Vulnerabilities (CVE)

Filtered by vendor Acronis Subscribe
Total 119 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-38086 2 Acronis, Microsoft 2 Cyber Protect, Windows 2023-12-10 4.4 MEDIUM 7.8 HIGH
Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking.
CVE-2020-15495 1 Acronis 1 True Image 2023-12-10 4.6 MEDIUM 7.8 HIGH
Acronis True Image 2019 update 1 through 2020 on macOS allows local privilege escalation due to an insecure XPC service configuration.
CVE-2021-32580 1 Acronis 1 True Image 2023-12-10 4.4 MEDIUM 7.8 HIGH
Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking.
CVE-2021-38088 2 Acronis, Microsoft 2 Cyber Protect, Windows 2023-12-10 4.6 MEDIUM 7.8 HIGH
Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking.
CVE-2020-9451 1 Acronis 1 True Image 2020 2023-12-10 2.1 LOW 5.5 MEDIUM
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot.
CVE-2021-32581 1 Acronis 3 Cyber Protect Cloud, Cyber Protection Agent, True Image 2023-12-10 5.8 MEDIUM 8.1 HIGH
Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation.
CVE-2020-35664 1 Acronis 1 Cyber Protect 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console.
CVE-2020-16171 1 Acronis 1 Cyber Backup 2023-12-10 6.4 MEDIUM 6.5 MEDIUM
An issue was discovered in Acronis Cyber Backup before 12.5 Build 16342. Some API endpoints on port 9877 under /api/ams/ accept an additional custom Shard header. The value of this header is afterwards used in a separate web request issued by the application itself. This can be abused to conduct SSRF attacks against otherwise unreachable Acronis services that are bound to localhost such as the NotificationService on 127.0.0.1:30572.
CVE-2020-35145 1 Acronis 1 True Image 2023-12-10 4.4 MEDIUM 7.8 HIGH
Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue.
CVE-2020-10139 1 Acronis 1 True Image 2023-12-10 7.2 HIGH 7.8 HIGH
Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
CVE-2020-10140 1 Acronis 1 True Image 2023-12-10 6.9 MEDIUM 7.3 HIGH
Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis.
CVE-2020-35556 1 Acronis 1 Cyber Protect 2023-12-10 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. Because the local notification service misconfigures CORS, information disclosure can occur.
CVE-2020-10138 1 Acronis 2 Cyber Backup, Cyber Protect 2023-12-10 7.2 HIGH 7.8 HIGH
Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
CVE-2017-3219 1 Acronis 1 True Image 2023-12-10 8.3 HIGH 8.8 HIGH
Acronis True Image up to and including version 2017 Build 8053 performs software updates using HTTP. Downloaded updates are only verified using a server-provided MD5 hash.
CVE-2008-1411 1 Acronis 1 Snap Deploy 2023-12-10 5.0 MEDIUM N/A
The PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to cause a denial of service (crash) via an incomplete TFTP request, which triggers a NULL pointer dereference.
CVE-2008-3671 2 Acronis, Linux 2 True Image Echo Server, Linux Kernel 2023-12-10 5.0 MEDIUM N/A
Acronis True Image Echo Server 9.x build 8072 on Linux does not properly encrypt backups to an FTP server, which allows remote attackers to obtain sensitive information. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CVE-2008-1410 1 Acronis 1 Snap Deploy 2023-12-10 4.3 MEDIUM N/A
Directory traversal vulnerability in the PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to read arbitrary files via directory traversal sequences to the TFTP service.
CVE-2008-1279 1 Acronis 1 True Image 2023-12-10 5.0 MEDIUM N/A
Acronis True Image Group Server 1.5.19.191 and earlier, included in Acronis True Image Enterprise Server 9.5.0.8072 and the other True Image packages, allows remote attackers to cause a denial of service (crash) via a packet with an invalid length field, which causes an out-of-bounds read.
CVE-2008-1280 1 Acronis 2 True Image, True Image Windows Agent 2023-12-10 5.0 MEDIUM N/A
Acronis True Image Windows Agent 1.0.0.54 and earlier, included in Acronis True Image Enterprise Server 9.5.0.8072 and the other True Image packages, allows remote attackers to cause a denial of service (crash) via a malformed packet to port 9876, which triggers a NULL pointer dereference.