Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.
History

Thu, 12 Sep 2024 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:acronis:snap_deploy:6:-:*:*:*:windows:*:*

Thu, 12 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:acronis:snap_deploy:6:update1.1:*:*:*:windows:*:*
cpe:2.3:a:acronis:snap_deploy:6:update1.2:*:*:*:windows:*:*
cpe:2.3:a:acronis:snap_deploy:6:update1:*:*:*:windows:*:*
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Thu, 29 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Acronis
Acronis snap Deploy
CPEs cpe:2.3:a:acronis:snap_deploy:*:*:*:*:*:windows:*:*
Vendors & Products Acronis
Acronis snap Deploy
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
Description Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.
Weaknesses CWE-427
References
Metrics cvssV3_0

{'score': 6.7, 'vector': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Acronis

Published: 2024-08-29T19:14:19.067Z

Updated: 2024-08-29T19:38:52.936Z

Reserved: 2024-04-29T15:33:32.846Z

Link: CVE-2024-34017

cve-icon Vulnrichment

Updated: 2024-08-29T19:38:45.785Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-29T20:15:07.743

Modified: 2024-09-12T17:16:09.890

Link: CVE-2024-34017

cve-icon Redhat

No data.