Patching for Windows Mac Linux
CVE Vulnerabilities for Acronis True Image
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2022‑24115 | 2022‑02‑04 23:15:16 | HIGH (8) | Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287 | 2 | 6 | LOCAL |
CVE‑2022‑24114 | 2022‑02‑04 23:15:16 | HIGH (7) | Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287 | 1 | 6 | LOCAL |
CVE‑2022‑24113 | 2022‑02‑04 23:15:16 | HIGH (8) | Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 | 2 | 6 | LOCAL |
CVE‑2021‑44206 | 2022‑02‑04 23:15:12 | HIGH (7) | Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 | 1 | 6 | LOCAL |
CVE‑2021‑44205 | 2022‑02‑04 23:15:12 | HIGH (7) | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 | 1 | 6 | LOCAL |
CVE‑2021‑44204 | 2022‑02‑04 23:15:12 | HIGH (8) | Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 | 2 | 6 | LOCAL |
CVE‑2021‑32581 | 2021‑08‑05 20:15:09 | HIGH (8) | Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation. | 3 | 5 | NETWORK |
CVE‑2021‑32580 | 2021‑08‑05 20:15:09 | HIGH (8) | Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking. | 2 | 6 | LOCAL |
CVE‑2021‑32579 | 2021‑08‑05 20:15:09 | HIGH (8) | Acronis True Image prior to 2021 Update 4 for Windows and Acronis True Image prior to 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API. | 2 | 6 | LOCAL |
CVE‑2021‑32578 | 2021‑08‑05 20:15:09 | HIGH (8) | Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2). | 2 | 6 | LOCAL |
CVE‑2021‑32577 | 2021‑08‑05 20:15:09 | HIGH (8) | Acronis True Image prior to 2021 Update 5 for Windows allowed local privilege escalation due to insecure folder permissions. | 2 | 6 | LOCAL |
CVE‑2021‑32576 | 2021‑08‑05 20:15:09 | HIGH (8) | Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 1 of 2). | 2 | 6 | LOCAL |
CVE‑2020‑9452 | 2021‑05‑25 12:15:08 | HIGH (8) | An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API. | 2 | 6 | LOCAL |
CVE‑2020‑9451 | 2021‑05‑25 12:15:08 | MEDIUM (6) | An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot. | 2 | 4 | LOCAL |
CVE‑2020‑9450 | 2021‑05‑25 12:15:08 | HIGH (8) | An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe exposes a REST API that can be used by everyone, even unprivileged users. This API is used to communicate from the GUI to anti_ransomware_service.exe. This can be exploited to add an arbitrary malicious executable to the whitelist, or even exclude an entire drive from being monitored by anti_ransomware_service.exe. | 2 | 6 | LOCAL |
CVE‑2020‑35145 | 2021‑01‑29 07:15:18 | HIGH (8) | Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue. | 2 | 6 | LOCAL |
CVE‑2020‑25736 | 2021‑07‑15 15:15:08 | HIGH (8) | Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration. | 2 | 6 | LOCAL |
CVE‑2020‑25593 | 2021‑07‑15 15:15:08 | MEDIUM (7) | Acronis True Image through 2021 on macOS allows local privilege escalation from admin to root due to insecure folder permissions. | 1 | 6 | LOCAL |
CVE‑2020‑15496 | 2021‑07‑15 14:15:13 | HIGH (8) | Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions. | 2 | 6 | LOCAL |
CVE‑2020‑15495 | 2021‑07‑15 15:15:08 | HIGH (8) | Acronis True Image 2019 update 1 through 2020 on macOS allows local privilege escalation due to an insecure XPC service configuration. | 2 | 6 | LOCAL |
CVE‑2020‑10140 | 2020‑10‑21 14:15:15 | HIGH (8) | Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis. | 2 | 6 | LOCAL |
CVE‑2020‑10139 | 2020‑10‑21 14:15:15 | HIGH (8) | Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges. | 2 | 6 | LOCAL |
CVE‑2017‑3219 | 2017‑06‑21 20:29:00 | HIGH (8) | Acronis True Image up to and including version 2017 Build 8053 performs software updates using HTTP. Downloaded updates are only verified using a server-provided MD5 hash. | 0 | 0 | ADJACENT_NETWORK |
What applications does Lavawall® monitor?
Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.