acronis CVE Vulnerabilities & Metrics

Focus on acronis vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About acronis Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with acronis. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total acronis CVEs: 128
Earliest CVE date: 10 Mar 2008, 23:44 UTC
Latest CVE date: 15 Oct 2024, 11:15 UTC

Latest CVE reference: CVE-2024-49388

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 10

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -84.38%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -84.38%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical acronis CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.86

Max CVSS: 8.3

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 87
4.0-6.9 41
7.0-8.9 5
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS acronis CVEs

These are the five CVEs with the highest CVSS scores for acronis, sorted by severity first and recency.

All CVEs for acronis

CVE-2024-49388 acronis vulnerability CVSS: 0 15 Oct 2024, 11:15 UTC

Sensitive information manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.

CVE-2024-49387 acronis vulnerability CVSS: 0 15 Oct 2024, 11:15 UTC

Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.

CVE-2024-49384 acronis vulnerability CVSS: 0 15 Oct 2024, 11:15 UTC

Excessive attack surface in acep-collector service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.

CVE-2024-49383 acronis vulnerability CVSS: 0 15 Oct 2024, 11:15 UTC

Excessive attack surface in acep-importer service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.

CVE-2024-49382 acronis vulnerability CVSS: 0 15 Oct 2024, 11:15 UTC

Excessive attack surface in archive-server service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.

CVE-2024-34019 acronis vulnerability CVSS: 0 29 Aug 2024, 20:15 UTC

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.

CVE-2024-34018 acronis vulnerability CVSS: 0 29 Aug 2024, 20:15 UTC

Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.

CVE-2024-34017 acronis vulnerability CVSS: 0 29 Aug 2024, 20:15 UTC

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.

CVE-2023-45249 acronis vulnerability CVSS: 0 24 Jul 2024, 14:15 UTC

Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.

CVE-2024-34012 acronis vulnerability CVSS: 0 14 Jun 2024, 10:15 UTC

Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.24135.272.

CVE-2023-48682 acronis vulnerability CVSS: 0 27 Feb 2024, 17:15 UTC

Stored cross-site scripting (XSS) vulnerability in unit name. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.

CVE-2023-48681 acronis vulnerability CVSS: 0 27 Feb 2024, 17:15 UTC

Self cross-site scripting (XSS) vulnerability in storage nodes search field. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.

CVE-2023-48680 acronis vulnerability CVSS: 0 27 Feb 2024, 17:15 UTC

Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Cyber Protect 16 (macOS, Windows) before build 37391.

CVE-2023-48679 acronis vulnerability CVSS: 0 27 Feb 2024, 17:15 UTC

Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.

CVE-2023-48678 acronis vulnerability CVSS: 0 27 Feb 2024, 17:15 UTC

Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.

CVE-2023-48676 acronis vulnerability CVSS: 0 14 Dec 2023, 14:15 UTC

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 36943.

CVE-2023-48677 acronis vulnerability CVSS: 0 12 Dec 2023, 09:15 UTC

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901, Acronis Cyber Protect Cloud Agent (Windows) before build 39378.

CVE-2023-45248 acronis vulnerability CVSS: 0 09 Oct 2023, 12:15 UTC

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 36497, Acronis Cyber Protect 16 (Windows) before build 37391.

CVE-2023-45247 acronis vulnerability CVSS: 0 09 Oct 2023, 12:15 UTC

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 36497, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169.

CVE-2023-45246 acronis vulnerability CVSS: 0 06 Oct 2023, 11:15 UTC

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 36343, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169.

CVE-2023-45245 acronis vulnerability CVSS: 0 06 Oct 2023, 10:15 UTC

Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36119.

CVE-2023-45244 acronis vulnerability CVSS: 0 06 Oct 2023, 10:15 UTC

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35895, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 37391.

CVE-2023-45243 acronis vulnerability CVSS: 0 05 Oct 2023, 22:15 UTC

Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.

CVE-2023-45242 acronis vulnerability CVSS: 0 05 Oct 2023, 22:15 UTC

Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.

CVE-2023-45241 acronis vulnerability CVSS: 0 05 Oct 2023, 22:15 UTC

Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35739, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 37391.

CVE-2023-45240 acronis vulnerability CVSS: 0 05 Oct 2023, 22:15 UTC

Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.

CVE-2023-44214 acronis vulnerability CVSS: 0 05 Oct 2023, 22:15 UTC

Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.

CVE-2023-44213 acronis vulnerability CVSS: 0 05 Oct 2023, 22:15 UTC

Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 35739, Acronis Cyber Protect 16 (Windows) before build 37391.

CVE-2023-44212 acronis vulnerability CVSS: 0 05 Oct 2023, 22:15 UTC

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31477.

CVE-2023-44211 acronis vulnerability CVSS: 0 05 Oct 2023, 22:15 UTC

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 31637, Acronis Cyber Protect 16 (Linux, Windows) before build 37391.

CVE-2023-44210 acronis vulnerability CVSS: 0 04 Oct 2023, 20:15 UTC

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 29258.

CVE-2023-44209 acronis vulnerability CVSS: 0 04 Oct 2023, 20:15 UTC

Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 29051.

CVE-2023-44208 acronis vulnerability CVSS: 0 04 Oct 2023, 12:15 UTC

Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.

CVE-2023-44207 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44206 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44205 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44161 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44160 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44159 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44158 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44157 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979.

CVE-2023-44156 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44155 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44154 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.

CVE-2023-44153 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.

CVE-2023-44152 acronis vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.

CVE-2023-5042 acronis vulnerability CVSS: 0 20 Sep 2023, 12:15 UTC

Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.

CVE-2023-4688 acronis vulnerability CVSS: 0 31 Aug 2023, 21:15 UTC

Sensitive information leak through log files. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35433.

CVE-2023-41751 acronis vulnerability CVSS: 0 31 Aug 2023, 21:15 UTC

Sensitive information disclosure due to improper token expiration validation. The following products are affected: Acronis Agent (Windows) before build 32047.

CVE-2023-41750 acronis vulnerability CVSS: 0 31 Aug 2023, 21:15 UTC

Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 32047.

CVE-2023-41749 acronis vulnerability CVSS: 0 31 Aug 2023, 21:15 UTC

Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979.

CVE-2022-46869 acronis vulnerability CVSS: 0 31 Aug 2023, 20:15 UTC

Local privilege escalation during installation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278.

CVE-2023-41748 acronis vulnerability CVSS: 0 31 Aug 2023, 18:15 UTC

Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.

CVE-2023-41747 acronis vulnerability CVSS: 0 31 Aug 2023, 18:15 UTC

Sensitive information disclosure due to unauthenticated path traversal. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.

CVE-2023-41746 acronis vulnerability CVSS: 0 31 Aug 2023, 18:15 UTC

Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.

CVE-2023-41745 acronis vulnerability CVSS: 0 31 Aug 2023, 18:15 UTC

Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.

CVE-2023-41744 acronis vulnerability CVSS: 0 31 Aug 2023, 16:15 UTC

Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979.

CVE-2023-41743 acronis vulnerability CVSS: 0 31 Aug 2023, 16:15 UTC

Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.

CVE-2023-41742 acronis vulnerability CVSS: 0 31 Aug 2023, 15:15 UTC

Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.

CVE-2022-46868 acronis vulnerability CVSS: 0 31 Aug 2023, 15:15 UTC

Local privilege escalation during recovery due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173.

CVE-2022-45451 acronis vulnerability CVSS: 0 31 Aug 2023, 15:15 UTC

Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.

CVE-2023-2782 acronis vulnerability CVSS: 0 18 May 2023, 11:15 UTC

Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.3.1-38.

CVE-2022-4418 acronis vulnerability CVSS: 0 18 May 2023, 10:15 UTC

Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40208.

CVE-2022-45459 acronis vulnerability CVSS: 0 18 May 2023, 10:15 UTC

Sensitive information disclosure due to insecure registry permissions. The following products are affected: Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984.

CVE-2022-45458 acronis vulnerability CVSS: 0 18 May 2023, 10:15 UTC

Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 29633, Acronis Cyber Protect 15 (Windows, macOS, Linux) before build 30984.

CVE-2022-45457 acronis vulnerability CVSS: 0 18 May 2023, 10:15 UTC

Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows) before build 29633, Acronis Cyber Protect 15 (Windows) before build 30984.

CVE-2022-45453 acronis vulnerability CVSS: 0 18 May 2023, 10:15 UTC

TLS/SSL weak cipher suites enabled. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 30984.

CVE-2022-45452 acronis vulnerability CVSS: 0 18 May 2023, 10:15 UTC

Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30430, Acronis Cyber Protect 15 (Windows) before build 30984.

CVE-2022-45450 acronis vulnerability CVSS: 0 18 May 2023, 10:15 UTC

Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 28610, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 30984.

CVE-2022-3405 acronis vulnerability CVSS: 0 03 May 2023, 11:15 UTC

Code execution and sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.

CVE-2022-30995 acronis vulnerability CVSS: 0 03 May 2023, 11:15 UTC

Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.

CVE-2023-2360 acronis vulnerability CVSS: 0 28 Apr 2023, 12:15 UTC

Sensitive information disclosure due to CORS misconfiguration. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.2.0-135.

CVE-2023-2355 acronis vulnerability CVSS: 0 27 Apr 2023, 19:15 UTC

Local privilege escalation due to a DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 3900.

CVE-2022-45456 acronis vulnerability CVSS: 0 26 Apr 2023, 20:15 UTC

Denial of service due to unauthenticated API endpoint. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 30161.

CVE-2022-45455 acronis vulnerability CVSS: 0 13 Feb 2023, 10:15 UTC

Local privilege escalation due to incomplete uninstallation cleanup. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107, Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984.

CVE-2022-45454 acronis vulnerability CVSS: 0 13 Feb 2023, 10:15 UTC

Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30161, Acronis Cyber Protect 15 (Windows) before build 30984.

CVE-2022-44747 acronis vulnerability CVSS: 0 07 Nov 2022, 20:15 UTC

Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.

CVE-2022-44746 acronis vulnerability CVSS: 0 07 Nov 2022, 20:15 UTC

Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.

CVE-2022-44745 acronis vulnerability CVSS: 0 07 Nov 2022, 20:15 UTC

Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.

CVE-2022-44744 acronis vulnerability CVSS: 0 07 Nov 2022, 20:15 UTC

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.

CVE-2022-44733 acronis vulnerability CVSS: 0 07 Nov 2022, 19:15 UTC

Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900.

CVE-2022-44732 acronis vulnerability CVSS: 0 07 Nov 2022, 19:15 UTC

Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900.

CVE-2022-30994 acronis vulnerability CVSS: 5.0 18 May 2022, 20:15 UTC

Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240

CVE-2022-30993 acronis vulnerability CVSS: 5.0 18 May 2022, 20:15 UTC

Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240

CVE-2022-30992 acronis vulnerability CVSS: 5.8 18 May 2022, 20:15 UTC

Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240

CVE-2022-30991 acronis vulnerability CVSS: 4.3 18 May 2022, 20:15 UTC

HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240

CVE-2022-30990 acronis vulnerability CVSS: 5.0 18 May 2022, 20:15 UTC

Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037

CVE-2022-30697 acronis vulnerability CVSS: 4.6 16 May 2022, 18:15 UTC

Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 3640

CVE-2022-30696 acronis vulnerability CVSS: 4.4 16 May 2022, 18:15 UTC

Local privilege escalation due to a DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 3640

CVE-2022-30695 acronis vulnerability CVSS: 4.6 16 May 2022, 18:15 UTC

Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Snap Deploy (Windows) before build 3640

CVE-2022-0483 acronis vulnerability CVSS: 4.6 11 Feb 2022, 18:15 UTC

Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis VSS Doctor (Windows) before build 53

CVE-2022-24115 acronis vulnerability CVSS: 4.6 04 Feb 2022, 23:15 UTC

Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287

CVE-2022-24114 acronis vulnerability CVSS: 4.4 04 Feb 2022, 23:15 UTC

Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287

CVE-2022-24113 acronis vulnerability CVSS: 4.6 04 Feb 2022, 23:15 UTC

Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287

CVE-2021-44206 acronis vulnerability CVSS: 4.4 04 Feb 2022, 23:15 UTC

Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287

CVE-2021-44205 acronis vulnerability CVSS: 4.4 04 Feb 2022, 23:15 UTC

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287

CVE-2021-44204 acronis vulnerability CVSS: 4.6 04 Feb 2022, 23:15 UTC

Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287

CVE-2021-34800 acronis vulnerability CVSS: 5.0 29 Nov 2021, 20:15 UTC

Sensitive information could be logged. The following products are affected: Acronis Agent (Windows, Linux, macOS) before build 27147

CVE-2021-44203 acronis vulnerability CVSS: 3.5 29 Nov 2021, 19:15 UTC

Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035

CVE-2021-44202 acronis vulnerability CVSS: 3.5 29 Nov 2021, 19:15 UTC

Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035

CVE-2021-44201 acronis vulnerability CVSS: 4.3 29 Nov 2021, 19:15 UTC

Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035

CVE-2021-44200 acronis vulnerability CVSS: 3.5 29 Nov 2021, 19:15 UTC

Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035

CVE-2021-44199 acronis vulnerability CVSS: 1.9 29 Nov 2021, 19:15 UTC

DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612

CVE-2021-44198 acronis vulnerability CVSS: 4.4 29 Nov 2021, 19:15 UTC

DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035

CVE-2021-38088 acronis vulnerability CVSS: 4.6 12 Aug 2021, 14:15 UTC

Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking.

CVE-2021-38087 acronis vulnerability CVSS: 4.3 12 Aug 2021, 14:15 UTC

Reflected cross-site scripting (XSS) was possible on the login page in Acronis Cyber Protect 15 prior to build 27009.

CVE-2021-38086 acronis vulnerability CVSS: 4.4 12 Aug 2021, 14:15 UTC

Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking.

CVE-2021-32581 acronis vulnerability CVSS: 5.8 05 Aug 2021, 20:15 UTC

Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation.

CVE-2021-32580 acronis vulnerability CVSS: 4.4 05 Aug 2021, 20:15 UTC

Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking.

CVE-2021-32579 acronis vulnerability CVSS: 4.6 05 Aug 2021, 20:15 UTC

Acronis True Image prior to 2021 Update 4 for Windows and Acronis True Image prior to 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API.

CVE-2021-32578 acronis vulnerability CVSS: 4.6 05 Aug 2021, 20:15 UTC

Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2).

CVE-2021-32577 acronis vulnerability CVSS: 4.6 05 Aug 2021, 20:15 UTC

Acronis True Image prior to 2021 Update 5 for Windows allowed local privilege escalation due to insecure folder permissions.

CVE-2021-32576 acronis vulnerability CVSS: 4.6 05 Aug 2021, 20:15 UTC

Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 1 of 2).

CVE-2020-25736 acronis vulnerability CVSS: 4.6 15 Jul 2021, 15:15 UTC

Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration.

CVE-2020-25593 acronis vulnerability CVSS: 7.2 15 Jul 2021, 15:15 UTC

Acronis True Image through 2021 on macOS allows local privilege escalation from admin to root due to insecure folder permissions.

CVE-2020-15495 acronis vulnerability CVSS: 4.6 15 Jul 2021, 15:15 UTC

Acronis True Image 2019 update 1 through 2020 on macOS allows local privilege escalation due to an insecure XPC service configuration.

CVE-2020-15496 acronis vulnerability CVSS: 4.6 15 Jul 2021, 14:15 UTC

Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions.

CVE-2020-9452 acronis vulnerability CVSS: 7.2 25 May 2021, 12:15 UTC

An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API.

CVE-2020-9451 acronis vulnerability CVSS: 2.1 25 May 2021, 12:15 UTC

An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot.

CVE-2020-9450 acronis vulnerability CVSS: 4.6 25 May 2021, 12:15 UTC

An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe exposes a REST API that can be used by everyone, even unprivileged users. This API is used to communicate from the GUI to anti_ransomware_service.exe. This can be exploited to add an arbitrary malicious executable to the whitelist, or even exclude an entire drive from being monitored by anti_ransomware_service.exe.

CVE-2020-35664 acronis vulnerability CVSS: 4.3 22 Feb 2021, 03:15 UTC

An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console.

CVE-2020-35556 acronis vulnerability CVSS: 5.0 22 Feb 2021, 03:15 UTC

An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. Because the local notification service misconfigures CORS, information disclosure can occur.

CVE-2020-35145 acronis vulnerability CVSS: 4.4 29 Jan 2021, 07:15 UTC

Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue.

CVE-2020-10140 acronis vulnerability CVSS: 6.9 21 Oct 2020, 14:15 UTC

Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis.

CVE-2020-10139 acronis vulnerability CVSS: 7.2 21 Oct 2020, 14:15 UTC

Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.

CVE-2020-10138 acronis vulnerability CVSS: 7.2 21 Oct 2020, 14:15 UTC

Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.

CVE-2020-16171 acronis vulnerability CVSS: 6.4 21 Sep 2020, 14:15 UTC

An issue was discovered in Acronis Cyber Backup before 12.5 Build 16342. Some API endpoints on port 9877 under /api/ams/ accept an additional custom Shard header. The value of this header is afterwards used in a separate web request issued by the application itself. This can be abused to conduct SSRF attacks against otherwise unreachable Acronis services that are bound to localhost such as the NotificationService on 127.0.0.1:30572.

CVE-2017-3219 acronis vulnerability CVSS: 8.3 21 Jun 2017, 20:29 UTC

Acronis True Image up to and including version 2017 Build 8053 performs software updates using HTTP. Downloaded updates are only verified using a server-provided MD5 hash.

CVE-2008-3671 acronis vulnerability CVSS: 5.0 13 Aug 2008, 19:41 UTC

Acronis True Image Echo Server 9.x build 8072 on Linux does not properly encrypt backups to an FTP server, which allows remote attackers to obtain sensitive information. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

CVE-2008-1411 acronis vulnerability CVSS: 5.0 20 Mar 2008, 10:44 UTC

The PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to cause a denial of service (crash) via an incomplete TFTP request, which triggers a NULL pointer dereference.

CVE-2008-1410 acronis vulnerability CVSS: 4.3 20 Mar 2008, 10:44 UTC

Directory traversal vulnerability in the PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to read arbitrary files via directory traversal sequences to the TFTP service.

CVE-2008-1279 acronis vulnerability CVSS: 5.0 10 Mar 2008, 23:44 UTC

Acronis True Image Group Server 1.5.19.191 and earlier, included in Acronis True Image Enterprise Server 9.5.0.8072 and the other True Image packages, allows remote attackers to cause a denial of service (crash) via a packet with an invalid length field, which causes an out-of-bounds read.

CVE-2008-1280 acronis vulnerability CVSS: 5.0 10 Mar 2008, 23:44 UTC

Acronis True Image Windows Agent 1.0.0.54 and earlier, included in Acronis True Image Enterprise Server 9.5.0.8072 and the other True Image packages, allows remote attackers to cause a denial of service (crash) via a malformed packet to port 9876, which triggers a NULL pointer dereference.