Filtered by vendor Acronis
Subscriptions
Total
127 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-44156 | 3 Acronis, Linux, Microsoft | 3 Cyber Protect, Linux Kernel, Windows | 2024-09-10 | 7.5 High |
Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | ||||
CVE-2023-44152 | 4 Acronis, Apple, Linux and 1 more | 4 Cyber Protect, Macos, Linux Kernel and 1 more | 2024-09-10 | 9.1 Critical |
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. | ||||
CVE-2023-45249 | 1 Acronis | 1 Cyber Infrastructure | 2024-08-22 | 9.8 Critical |
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132. | ||||
CVE-2024-34012 | 1 Acronis | 1 Cloud Manager | 2024-08-07 | 4.4 Medium |
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.24135.272. | ||||
CVE-2008-1410 | 1 Acronis | 1 Snap Deploy | 2024-08-07 | N/A |
Directory traversal vulnerability in the PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to read arbitrary files via directory traversal sequences to the TFTP service. | ||||
CVE-2008-1411 | 1 Acronis | 1 Snap Deploy | 2024-08-07 | N/A |
The PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to cause a denial of service (crash) via an incomplete TFTP request, which triggers a NULL pointer dereference. | ||||
CVE-2008-1280 | 1 Acronis | 2 True Image, True Image Windows Agent | 2024-08-07 | N/A |
Acronis True Image Windows Agent 1.0.0.54 and earlier, included in Acronis True Image Enterprise Server 9.5.0.8072 and the other True Image packages, allows remote attackers to cause a denial of service (crash) via a malformed packet to port 9876, which triggers a NULL pointer dereference. | ||||
CVE-2008-1279 | 1 Acronis | 1 True Image | 2024-08-07 | N/A |
Acronis True Image Group Server 1.5.19.191 and earlier, included in Acronis True Image Enterprise Server 9.5.0.8072 and the other True Image packages, allows remote attackers to cause a denial of service (crash) via a packet with an invalid length field, which causes an out-of-bounds read. | ||||
CVE-2017-3219 | 1 Acronis | 1 True Image | 2024-08-05 | N/A |
Acronis True Image up to and including version 2017 Build 8053 performs software updates using HTTP. Downloaded updates are only verified using a server-provided MD5 hash. | ||||
CVE-2020-35664 | 1 Acronis | 1 Cyber Protect | 2024-08-04 | 6.1 Medium |
An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console. | ||||
CVE-2020-35556 | 1 Acronis | 1 Cyber Protect | 2024-08-04 | 7.5 High |
An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. Because the local notification service misconfigures CORS, information disclosure can occur. | ||||
CVE-2020-35145 | 1 Acronis | 1 True Image | 2024-08-04 | 7.8 High |
Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue. | ||||
CVE-2020-25736 | 1 Acronis | 1 True Image | 2024-08-04 | 7.8 High |
Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration. | ||||
CVE-2020-25593 | 1 Acronis | 1 True Image | 2024-08-04 | 6.7 Medium |
Acronis True Image through 2021 on macOS allows local privilege escalation from admin to root due to insecure folder permissions. | ||||
CVE-2020-16171 | 1 Acronis | 1 Cyber Backup | 2024-08-04 | 6.5 Medium |
An issue was discovered in Acronis Cyber Backup before 12.5 Build 16342. Some API endpoints on port 9877 under /api/ams/ accept an additional custom Shard header. The value of this header is afterwards used in a separate web request issued by the application itself. This can be abused to conduct SSRF attacks against otherwise unreachable Acronis services that are bound to localhost such as the NotificationService on 127.0.0.1:30572. | ||||
CVE-2020-15496 | 1 Acronis | 1 True Image | 2024-08-04 | 7.8 High |
Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions. | ||||
CVE-2020-15495 | 1 Acronis | 1 True Image | 2024-08-04 | 7.8 High |
Acronis True Image 2019 update 1 through 2020 on macOS allows local privilege escalation due to an insecure XPC service configuration. | ||||
CVE-2020-14999 | 2 Acronis, Microsoft | 2 Agent, Windows | 2024-08-04 | 7.5 High |
A logic bug in system monitoring driver of Acronis Agent after 12.5.21540 and before 12.5.23094 allowed to bypass Windows memory protection and access sensitive data. | ||||
CVE-2020-10140 | 1 Acronis | 1 True Image | 2024-08-04 | 7.8 High |
Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis. | ||||
CVE-2020-10139 | 1 Acronis | 1 True Image | 2024-08-04 | 7.8 High |
Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges. |