Impact
The vulnerability arises from improper handling of symbolic links, allowing a local attacker to gain higher privileges on the affected system. This flaw can elevate a low‑privilege user to an administrator or system account, compromising confidentiality, integrity, and availability of the Acronis Cyber Protect installation. The weakness is classified as CWE‑610.
Affected Systems
The flaw affects the Acronis Cyber Protect 17 product for Windows systems, specifically versions built before 41186. Any Windows installation of this product that has not reached the specified build is susceptible.
Risk and Exploitability
The CVSS score of 7.3 indicates a high severity, yet the EPSS score of less than 1% suggests a very low likelihood of exploitation at the present time. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be local, requiring the attacker to have access to the target machine’s user environment to craft or manipulate symbolic links that the software ingests.
OpenCVE Enrichment