Acronis True Image 2021 Update 1 for Windows

CPE Details

Acronis True Image 2021 Update 1 for Windows
2021
2021-08-11
12h01 +00:00
2021-09-25
11h37 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:windows:*:*

Informations

Vendor

acronis

Product

true_image

Version

2021

Update

update_1

Target Software

windows

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-44206 2022-02-04 22h29 +00:00 Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
7.3
Haute
CVE-2021-44204 2022-02-04 22h29 +00:00 Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
7.8
Haute
CVE-2021-44205 2022-02-04 22h29 +00:00 Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
7.3
Haute
CVE-2022-24113 2022-02-04 22h29 +00:00 Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
7.8
Haute
CVE-2021-32577 2021-08-05 17h21 +00:00 Acronis True Image prior to 2021 Update 5 for Windows allowed local privilege escalation due to insecure folder permissions.
7.8
Haute
CVE-2021-32581 2021-08-05 17h19 +00:00 Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation.
8.1
Haute
CVE-2021-32578 2021-08-05 17h16 +00:00 Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2).
7.8
Haute
CVE-2021-32576 2021-08-05 17h07 +00:00 Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 1 of 2).
7.8
Haute
CVE-2021-32580 2021-08-05 17h06 +00:00 Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking.
7.8
Haute
CVE-2021-32579 2021-08-05 17h04 +00:00 Acronis True Image prior to 2021 Update 4 for Windows and Acronis True Image prior to 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API.
7.8
Haute
CVE-2020-35145 2021-01-29 05h49 +00:00 Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue.
7.8
Haute
CVE-2020-10139 2020-10-21 11h40 +00:00 Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
7.8
Haute
CVE-2020-10140 2020-10-21 11h40 +00:00 Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis.
7.8
Haute