Impact
Acronis True Image on Windows contains a flaw in the way it loads Dynamic Link Libraries. A local attacker can place a malicious DLL in the program’s search path, causing the application to load that DLL instead of the intended one. The resulting code execution can grant the attacker elevated privileges on the affected system, effectively allowing privilege escalation.
Affected Systems
Acronis True Image for Windows versions prior to build 42902 are affected. The vulnerability is specific to Windows installations of this product.
Risk and Exploitability
The CVSS score of 6.7 indicates medium severity. The attack path requires a local attacker or one who can write to the installation directory, so the exploit is limited to environments with local access. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, implying no widely reported exploitation yet. Nonetheless, the potential for privilege escalation warrants immediate remediation, and the likely attack vector is local DLL hijacking inferred from the description.
OpenCVE Enrichment