Acronis True Image 2021 for MacOS

CPE Details

Acronis True Image 2021 for MacOS
2021
2021-07-21
10h46 +00:00
2021-07-26
15h30 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:acronis:true_image:2021:-:*:*:*:macos:*:*

Informations

Vendor

acronis

Product

true_image

Version

2021

Update

-

Target Software

macos

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-24114 2022-02-04 22h29 +00:00 Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287
7
Haute
CVE-2022-24115 2022-02-04 22h29 +00:00 Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287
7.8
Haute
CVE-2021-32581 2021-08-05 17h19 +00:00 Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation.
8.1
Haute
CVE-2021-32579 2021-08-05 17h04 +00:00 Acronis True Image prior to 2021 Update 4 for Windows and Acronis True Image prior to 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API.
7.8
Haute
CVE-2020-25593 2021-07-15 12h07 +00:00 Acronis True Image through 2021 on macOS allows local privilege escalation from admin to root due to insecure folder permissions.
6.7
Moyen
CVE-2020-15496 2021-07-15 11h57 +00:00 Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions.
7.8
Haute
CVE-2020-10139 2020-10-21 11h40 +00:00 Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
7.8
Haute
CVE-2020-10140 2020-10-21 11h40 +00:00 Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis.
7.8
Haute