cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-49385,https://securityvulnerability.io/vulnerability/CVE-2024-49385,Sensitive Information Disclosure in Acronis True Image by Acronis,"A vulnerability exists in Acronis True Image (Windows) that allows for sensitive information disclosure due to improper folder permissions. This security flaw can potentially expose confidential data stored within the application, affecting users who have not upgraded to build 41736 or later. The oversight in permissions can lead to unauthorized access, raising significant privacy and security concerns for both individual and enterprise users. It is crucial for users to address this vulnerability by ensuring their software version is updated to the latest build to mitigate potential risks associated with this issue.",Acronis,Acronis True Image,,,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-02T14:14:35.360Z,0 CVE-2024-55538,https://securityvulnerability.io/vulnerability/CVE-2024-55538,Sensitive Information Disclosure in Acronis True Image by Acronis,"A vulnerability has been identified in Acronis True Image where sensitive information can be disclosed due to insufficient authentication measures. This affects users of both the macOS and Windows versions of the software, specifically those using versions prior to build 41725 for macOS and build 41736 for Windows. Without adequate protective measures, unauthorized users may gain access to sensitive data, posing a risk to user privacy and data integrity. It is crucial for users to update their applications to the latest builds to mitigate this vulnerability.",Acronis,Acronis True Image,,,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-02T14:14:20.929Z,0 CVE-2024-34013,https://securityvulnerability.io/vulnerability/CVE-2024-34013,Acronis True Image (macOS) Before Build 41396 Vulnerable to Local Privilege Escalation Due to OS Command Injection,"A security vulnerability has been identified in Acronis True Image for macOS due to local privilege escalation stemming from OS command injection. This vulnerability can potentially allow unauthorized users to execute commands with elevated privileges, which could lead to harmful modifications or access to sensitive data on affected systems. It is critical for users and administrators to ensure that they update to the latest build to mitigate the risks associated with this vulnerability.",Acronis,Acronis True Image,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-07-18T13:36:39.924Z,0 CVE-2021-44205,https://securityvulnerability.io/vulnerability/CVE-2021-44205,Local privilege escalation due to DLL hijacking vulnerability,"Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287",Acronis,"Acronis Cyber Protect Home Office,Acronis True Image 2021",7.3,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-04T23:15:00.000Z,0 CVE-2022-24113,https://securityvulnerability.io/vulnerability/CVE-2022-24113,Local privilege escalation due to excessive permissions assigned to child processes,"Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287",Acronis,"Acronis Cyber Protect 15,Acronis Agent,Acronis Cyber Protect Home Office,Acronis True Image 2021",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-04T23:15:00.000Z,0 CVE-2022-24115,https://securityvulnerability.io/vulnerability/CVE-2022-24115,Local privilege escalation due to unrestricted loading of unsigned libraries,"Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287",Acronis,"Acronis Cyber Protect Home Office,Acronis True Image 2021",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-04T23:15:00.000Z,0 CVE-2021-44204,https://securityvulnerability.io/vulnerability/CVE-2021-44204,Local privilege escalation via named pipe due to improper access control checks,"Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287",Acronis,"Acronis Cyber Protect 15,Acronis Agent,Acronis Cyber Protect Home Office,Acronis True Image 2021",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-04T23:15:00.000Z,0 CVE-2021-44206,https://securityvulnerability.io/vulnerability/CVE-2021-44206,Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service,"Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287",Acronis,"Acronis Cyber Protect Home Office,Acronis True Image 2021",7.3,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-04T23:15:00.000Z,0 CVE-2022-24114,https://securityvulnerability.io/vulnerability/CVE-2022-24114,Local privilege escalation due to race condition on application startup,"Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287",Acronis,"Acronis Cyber Protect Home Office,Acronis True Image 2021",7,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-02-02T00:00:00.000Z,0 CVE-2021-32577,https://securityvulnerability.io/vulnerability/CVE-2021-32577,Local Privilege Escalation in Acronis True Image for Windows,"A vulnerability exists in Acronis True Image for Windows, specifically prior to the 2021 Update 5 version. This issue stems from insecure folder permissions, which could potentially allow a local attacker to escalate their privileges. By exploiting this vulnerability, an adversary might be able to perform unauthorized actions on the affected system, potentially compromising data integrity and user security.",Acronis,True Image,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-08-05T19:21:04.000Z,0 CVE-2021-32581,https://securityvulnerability.io/vulnerability/CVE-2021-32581,SSL Certificate Validation Flaw in Acronis True Image and Cyber Protect,"Certain versions of Acronis True Image and Acronis Cyber Protect did not properly implement SSL certificate validation, potentially allowing attackers to intercept sensitive data during transmission. This oversight could lead to information disclosure and compromise user security. Users are encouraged to update to the latest versions to mitigate the associated risks.",Acronis,"True Image,Cyber Protect Cloud,Cyber Protection Agent",8.1,HIGH,0.0015300000086426735,false,,false,false,false,,,false,false,,2021-08-05T19:19:41.000Z,0 CVE-2021-32578,https://securityvulnerability.io/vulnerability/CVE-2021-32578,Local Privilege Escalation in Acronis True Image by Acronis,"Acronis True Image prior to the 2021 Update 4 for Windows is susceptible to a local privilege escalation vulnerability due to inappropriate handling of soft links. This flaw can enable attackers with local access to elevate their privileges, potentially leading to unauthorized access and manipulation of system resources. It is crucial for users of affected versions to apply the recommended updates to safeguard against potential exploitation.",Acronis,True Image,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-08-05T19:16:41.000Z,0 CVE-2021-32576,https://securityvulnerability.io/vulnerability/CVE-2021-32576,Local Privilege Escalation in Acronis True Image for Windows,"Acronis True Image prior to the 2021 Update 4 for Windows suffers from a local privilege escalation vulnerability caused by improper handling of symbolic links. This issue can potentially allow an attacker with access to the system to gain elevated privileges, enabling them to execute unauthorized commands or access sensitive data.",Acronis,True Image,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-08-05T19:07:57.000Z,0 CVE-2021-32580,https://securityvulnerability.io/vulnerability/CVE-2021-32580,Local Privilege Escalation in Acronis True Image for Windows,"A vulnerability exists in Acronis True Image for Windows that allows local privilege escalation due to DLL hijacking. This security flaw enables attackers to execute malicious code with elevated privileges, potentially compromising the system. Affected users are advised to update to the latest version to mitigate this risk.",Acronis,True Image,7.8,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2021-08-05T19:06:36.000Z,0 CVE-2021-32579,https://securityvulnerability.io/vulnerability/CVE-2021-32579,Unauthenticated Local Code Execution Vulnerability in Acronis True Image,"A vulnerability in Acronis True Image allows an unauthenticated attacker with local code execution capabilities to manipulate the micro-service API. This flaw could lead to unauthorized actions being performed within the affected systems, potentially compromising the integrity and security of user data. Users of Acronis True Image are advised to update their software to the latest versions to mitigate any potential risks associated with this vulnerability.",Acronis,True Image,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-08-05T19:04:57.000Z,0 CVE-2020-15495,https://securityvulnerability.io/vulnerability/CVE-2020-15495,,Acronis True Image 2019 update 1 through 2020 on macOS allows local privilege escalation due to an insecure XPC service configuration.,Acronis,True Image,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-07-15T14:19:18.000Z,0 CVE-2020-25593,https://securityvulnerability.io/vulnerability/CVE-2020-25593,,Acronis True Image through 2021 on macOS allows local privilege escalation from admin to root due to insecure folder permissions.,Acronis,True Image,6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-07-15T14:07:55.000Z,0 CVE-2020-15496,https://securityvulnerability.io/vulnerability/CVE-2020-15496,,Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions.,Acronis,True Image,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-07-15T13:57:08.000Z,0 CVE-2020-25736,https://securityvulnerability.io/vulnerability/CVE-2020-25736,,Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration.,Acronis,True Image,7.8,HIGH,0.0015200000489130616,false,,false,false,false,,,false,false,,2021-07-15T00:00:00.000Z,0 CVE-2020-9452,https://securityvulnerability.io/vulnerability/CVE-2020-9452,,"An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API.",Acronis,True Image 2020,7.8,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2021-05-25T11:21:58.000Z,0 CVE-2020-9450,https://securityvulnerability.io/vulnerability/CVE-2020-9450,,"An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe exposes a REST API that can be used by everyone, even unprivileged users. This API is used to communicate from the GUI to anti_ransomware_service.exe. This can be exploited to add an arbitrary malicious executable to the whitelist, or even exclude an entire drive from being monitored by anti_ransomware_service.exe.",Acronis,True Image 2020,7.8,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2021-05-25T11:08:01.000Z,0 CVE-2020-9451,https://securityvulnerability.io/vulnerability/CVE-2020-9451,,"An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot.",Acronis,True Image 2020,5.5,MEDIUM,0.000699999975040555,false,,false,false,false,,,false,false,,2021-05-25T11:01:41.000Z,0 CVE-2020-35145,https://securityvulnerability.io/vulnerability/CVE-2020-35145,,"Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue.",Acronis,True Image,7.8,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2021-01-29T06:49:39.000Z,0 CVE-2020-10139,https://securityvulnerability.io/vulnerability/CVE-2020-10139,,"Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.",Acronis,True Image 2021,7.8,HIGH,0.0017999999690800905,false,,false,false,false,,,false,false,,2020-10-21T13:40:19.000Z,0 CVE-2020-10140,https://securityvulnerability.io/vulnerability/CVE-2020-10140,,"Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis.",Acronis,True Image,7.8,HIGH,0.0017999999690800905,false,,false,false,false,,,false,false,,2020-10-21T13:40:19.000Z,0