Acronis True Image 2021 Update 3 for MacOS

CPE Details

Acronis True Image 2021 Update 3 for MacOS
2021
2021-07-21
10h46 +00:00
2021-07-26
15h30 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:macos:*:*

Informations

Vendor

acronis

Product

true_image

Version

2021

Update

update_3

Target Software

macos

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-24114 2022-02-04 22h29 +00:00 Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287
7
High
CVE-2022-24115 2022-02-04 22h29 +00:00 Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287
7.8
High
CVE-2021-32581 2021-08-05 17h19 +00:00 Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation.
8.1
High
CVE-2021-32579 2021-08-05 17h04 +00:00 Acronis True Image prior to 2021 Update 4 for Windows and Acronis True Image prior to 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API.
7.8
High
CVE-2020-25593 2021-07-15 12h07 +00:00 Acronis True Image through 2021 on macOS allows local privilege escalation from admin to root due to insecure folder permissions.
6.7
Medium
CVE-2020-15496 2021-07-15 11h57 +00:00 Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions.
7.8
High
CVE-2020-10139 2020-10-21 11h40 +00:00 Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
7.8
High
CVE-2020-10140 2020-10-21 11h40 +00:00 Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis.
7.8
High