Description
Local privilege escalation due to improper directory permissions. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.
Published: 2026-03-05
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local privilege escalation
Action: Patch
AI Analysis

Impact

Acronis Cyber Protect 17 on Windows may allow a local user with limited rights to gain administrative privileges by exploiting improperly set directory permissions. This flaw enables the user to modify application files or configuration data, which can lead to execution of arbitrary code or escalation to higher privileges. The weakness corresponds to CWE-276, improper authorization.

Affected Systems

The vulnerability affects Acronis Cyber Protect 17 for Windows in builds prior to 41186. Users running older versions should verify their build number and consider upgrading to a supported release.

Risk and Exploitability

The CVSS score of 5.0 indicates medium severity. The Economics of Security Predictions Service shows a low exploitation probability (<1 %). The vulnerability is not listed in the CISA KEV catalog. While no publicly documented exploit exists, the local attacker requirement means any machine with untrusted local accounts or weak user isolation could be targeted, making timely remediation advisable.

Generated by OpenCVE AI on April 16, 2026 at 11:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Acronis Cyber Protect 17 to build 41186 or later to obtain the directed permission fix.
  • Verify that installation and data directories are owned by the intended administrative accounts and that write permissions are restricted to users who require them.
  • Implement least‑privilege access controls to prevent non‑administrative local accounts from modifying application files or configurations.

Generated by OpenCVE AI on April 16, 2026 at 11:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Improper Directory Permissions in Acronis Cyber Protect 17

Wed, 11 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Acronis cyber Protect
Microsoft
Microsoft windows
CPEs cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Acronis cyber Protect
Microsoft
Microsoft windows

Mon, 09 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Acronis
Acronis acronis Cyber Protect 17
Vendors & Products Acronis
Acronis acronis Cyber Protect 17

Fri, 06 Mar 2026 00:00:00 +0000

Type Values Removed Values Added
Description Local privilege escalation due to improper directory permissions. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.
Weaknesses CWE-276
References
Metrics cvssV3_0

{'score': 5, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}


Subscriptions

Acronis Acronis Cyber Protect 17 Cyber Protect
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: Acronis

Published:

Updated: 2026-03-09T13:42:55.003Z

Reserved: 2026-03-03T02:29:03.753Z

Link: CVE-2026-28717

cve-icon Vulnrichment

Updated: 2026-03-09T13:42:52.525Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T00:16:12.363

Modified: 2026-03-11T14:01:32.347

Link: CVE-2026-28717

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:00:11Z

Weaknesses