Description
Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect Cloud Agent (Windows) before build 42183.
Published: 2026-04-29
Score: 7.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Acronis products have a local privilege escalation flaw caused by improper input validation, allowing an attacker with local access to elevate privileges. The vulnerability matches CWE‑123, a type of incorrect input validation that enables unauthorized actions. It can potentially let a malicious user gain administrative rights on a Windows host, compromising confidentiality, integrity, and system availability.

Affected Systems

Acronis DeviceLock DLP for Windows before build 9.0.93212 and Acronis Cyber Protect Cloud Agent for Windows before build 42183 are affected.

Risk and Exploitability

The CVSS score of 7.8 classifies the vulnerability as High severity, indicating significant impact if exploited. The EPSS score is not available, so current exploitation probability is unknown, and the vulnerability is not listed in CISA KEV. The attack likely requires local access to the system and crafting of specific inputs that bypass validation within the agent processes. Given the lack of published exploit, the risk of exploitation is moderate but remains high due to the privileged escalation potential.

Generated by OpenCVE AI on April 29, 2026 at 21:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Acronis DeviceLock DLP to at least build 9.0.93212
  • Upgrade Acronis Cyber Protect Cloud Agent to at least build 42183
  • Apply the principle of least privilege to local accounts that can interact with these agents and monitor for suspicious activity

Generated by OpenCVE AI on April 29, 2026 at 21:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
Description Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect Cloud Agent (Windows) before build 42183.
Weaknesses CWE-123
References
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Acronis

Published:

Updated: 2026-04-29T15:11:54.832Z

Reserved: 2026-04-27T10:37:25.434Z

Link: CVE-2026-41952

cve-icon Vulnrichment

Updated: 2026-04-29T15:11:51.706Z

cve-icon NVD

Status : Received

Published: 2026-04-29T15:16:06.417

Modified: 2026-04-29T15:16:06.417

Link: CVE-2026-41952

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T21:30:20Z

Weaknesses