Description
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636, Acronis True Image for SanDisk (Windows) before build 42679, Acronis True Image OEM (Windows) before build 42575.
Published: 2025-09-30
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Apply Upgrade
AI Analysis

Impact

Acronis True Image software on Windows can be abused from an unprivileged user to gain elevated local privileges through a DLL hijacking flaw. The weakness allows an attacker to place a malicious DLL in a directory that precedes the legitimate DLL in the search path, causing the application to load the attacker-controlled code. The result is that the attacker can execute arbitrary code with the same privileges as the application, which typically run with administrative rights, leading to full system compromise.

Affected Systems

Affected products include Acronis True Image for Windows and its OEM, SanDisk, and Western Digital editions. The vulnerability exists in builds before 42386 for the standard product, before 42636 for the Western Digital version, before 42679 for the SanDisk version, and before 42575 for the OEM edition.

Risk and Exploitability

The CVSS score of 7.3 indicates a high severity local privilege escalation risk, while the EPSS score of less than 1% suggests that widespread exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local access to the machine and the ability to place a DLL in a directory that the application scans before its installed location, which may be feasible in environments where unprivileged users have write permissions to temporary or program directories. Once executed, the attacker immediately gains elevated rights, posing an immediate threat to system confidentiality, integrity, and availability.

Generated by OpenCVE AI on April 20, 2026 at 17:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Acronis True Image for Windows release that is newer than build 42386 (and the corresponding newer builds for OEM, SanDisk, and Western Digital editions).
  • If an upgrade cannot be performed immediately, restrict DLL search order by ensuring that the directory containing the vulnerable DLL is not writable by unprivileged users, or apply software restriction policies that prevent execution of DLL files from non‑trusted locations.
  • Continuously monitor the system for unexpected DLLs or file creation events in application directories and enforce strict permissions on those folders to reduce the risk of DLL hijacking.

Generated by OpenCVE AI on April 20, 2026 at 17:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-31741 Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386.
History

Mon, 20 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Title DLL Hijacking Leading to Local Privilege Escalation in Acronis True Image

Fri, 10 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636, Acronis True Image for SanDisk (Windows) before build 42679. Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636, Acronis True Image for SanDisk (Windows) before build 42679, Acronis True Image OEM (Windows) before build 42575.

Tue, 03 Feb 2026 22:45:00 +0000

Type Values Removed Values Added
Description Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636. Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636, Acronis True Image for SanDisk (Windows) before build 42679.

Thu, 22 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Description Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386. Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636.

Thu, 02 Oct 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Acronis
Acronis true Image
Microsoft
Microsoft windows
Vendors & Products Acronis
Acronis true Image
Microsoft
Microsoft windows

Tue, 30 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 15:00:00 +0000

Type Values Removed Values Added
Description Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386.
Weaknesses CWE-427
References
Metrics cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Acronis True Image
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: Acronis

Published:

Updated: 2026-04-10T13:16:25.613Z

Reserved: 2025-09-29T22:35:29.171Z

Link: CVE-2025-11178

cve-icon Vulnrichment

Updated: 2025-09-30T15:27:49.865Z

cve-icon NVD

Status : Deferred

Published: 2025-09-30T15:15:47.863

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11178

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T18:00:11Z

Weaknesses