Vulnerabilites related to acronis - cyber_protect
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
apple | macos | - | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." }, { "lang": "es", "value": "Divulgaci\u00f3n y manipulaci\u00f3n de informaci\u00f3n sensible por autenticaci\u00f3n inadecuada. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, macOS, Windows) antes de la build 35979." } ], "id": "CVE-2023-44152", "lastModified": "2024-11-21T08:25:19.667", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:37.493", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1908" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "security@acronis.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979." }, { "lang": "es", "value": "Escalada de privilegios locales debido a permisos de carpetas inseguros. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Windows) anterior a la build 35979." } ], "id": "CVE-2023-44157", "lastModified": "2024-11-21T08:25:20.330", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:37.897", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3956" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-31 15:15
Modified
2024-11-21 07:29
Severity ?
Summary
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/SEC-5487 | Release Notes, Vendor Advisory | |
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-4858 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/SEC-5487 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-4858 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect_home_office | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:windows:*:*", "matchCriteriaId": "56BAA7EE-BE79-4F61-9374-8308F20E864F", "versionEndExcluding": "c22.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:windows:*:*", "matchCriteriaId": "16169F2D-5853-4A75-870A-9536EBC82091", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:windows:*:*", "matchCriteriaId": "82874E4D-44DB-4FBD-8716-2B559CB3AE27", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:windows:*:*", "matchCriteriaId": "ED7537E4-682D-48F0-9113-13C92966D6C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:windows:*:*", "matchCriteriaId": "88A49174-1222-444E-8127-CDA891C8847E", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:windows:*:*", "matchCriteriaId": "86C6881F-7F06-42E8-B80B-3BC52FF4829C", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:windows:*:*", "matchCriteriaId": "8DE5F9FA-94F6-4AD4-BF5F-6BB8B22673D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242EAE22-310A-4A7B-9421-21719C7E9310", "versionEndExcluding": "40173", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "id": "CVE-2022-45451", "lastModified": "2024-11-21T07:29:16.817", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-31T15:15:08.213", "references": [ { "source": "security@acronis.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/SEC-5487" }, { "source": "security@acronis.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/SEC-5487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4858" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 06:30
Severity ?
Summary
Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | true_image | 2021 | |
acronis | true_image | 2021 | |
acronis | true_image | 2021 | |
acronis | true_image | 2021 | |
acronis | true_image | 2021 | |
acronis | true_image | 2021 | |
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect_home_office | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:true_image:2021:*:*:*:*:-:*:*", "matchCriteriaId": "7DC81A5D-044A-44EF-8695-748A63778291", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:windows:*:*", "matchCriteriaId": "B1CFEB0F-588B-4B88-9169-4ADB6396C1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_2:*:*:*:windows:*:*", "matchCriteriaId": "54BE6067-0357-4C68-AA06-CB5EEA3DD86F", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:windows:*:*", "matchCriteriaId": "02D1EBBC-47EE-4C46-AA69-DD0B7DE1B173", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_4:*:*:*:windows:*:*", "matchCriteriaId": "0CF1A7BF-9B93-4D7C-BCD8-30DEF789B46B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_5:*:*:*:windows:*:*", "matchCriteriaId": "B55B6ED7-C602-4C7B-88C5-B0499D61EB1E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "85D71339-7F19-41DC-B6D2-BF776F472EE1", "versionEndExcluding": "c21.06", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*", "matchCriteriaId": "8418AF63-E280-4CE2-8E5C-DCD00ABE6557", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" }, { "lang": "es", "value": "Una escalada de privilegios local por medio de una tuber\u00eda con nombre debido a comprobaciones de control de acceso inapropiadas. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows) versiones anteriores a la compilaci\u00f3n 28035, Acronis Agent (Windows) versiones anteriores a la compilaci\u00f3n 27147, Acronis Cyber Protect Home Office (Windows) versiones anteriores a la compilaci\u00f3n 39612, Acronis True Image 2021 (Windows) versiones anteriores a la compilaci\u00f3n 39287" } ], "id": "CVE-2021-44204", "lastModified": "2024-11-21T06:30:34.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-04T23:15:12.013", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2355" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2355" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-18 20:15
Modified
2024-11-21 07:03
Severity ?
Summary
HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-3928 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-3928 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" }, { "lang": "es", "value": "Una Inyecci\u00f3n de HTML por medio del nombre del informe. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Linux, Windows) versiones anteriores a 29240" } ], "id": "CVE-2022-30991", "lastModified": "2024-11-21T07:03:40.427", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-18T20:15:08.337", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3928" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-15 11:15
Modified
2025-02-04 17:06
Severity ?
Summary
Sensitive information manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-5984 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 16 | |
acronis | cyber_protect | 16 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1C021-5866-4826-B27B-842D949D552C", "versionEndIncluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." }, { "lang": "es", "value": "Manipulaci\u00f3n de informaci\u00f3n confidencial debido a una autorizaci\u00f3n indebida. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 16 (Linux, Windows) anterior a la compilaci\u00f3n 38690." } ], "id": "CVE-2024-49388", "lastModified": "2025-02-04T17:06:04.150", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-15T11:15:14.063", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5984" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-13 10:15
Modified
2024-11-21 07:29
Severity ?
Summary
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30161, Acronis Cyber Protect 15 (Windows) before build 30984.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1556671-9476-4082-8A8C-49B9DFB0F6D5", "versionEndExcluding": "c22.08", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30161, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "id": "CVE-2022-45454", "lastModified": "2024-11-21T07:29:17.153", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-13T10:15:14.347", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4379" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-31 15:15
Modified
2024-11-21 08:21
Severity ?
Summary
Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-4351 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-4351 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
apple | macos | - | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "20951C06-CFEC-4A94-8E92-3AFAA54C12AD", "versionEndExcluding": "c22.09", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "id": "CVE-2023-41742", "lastModified": "2024-11-21T08:21:36.203", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-31T15:15:08.520", "references": [ { "source": "security@acronis.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4351" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1327" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-18 10:15
Modified
2024-11-21 07:29
Severity ?
Summary
Sensitive information disclosure due to insecure registry permissions. The following products are affected: Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "153D2368-8196-43CD-9EC6-74B995006923", "versionEndExcluding": "c22.07", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure registry permissions. The following products are affected: Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "id": "CVE-2022-45459", "lastModified": "2024-11-21T07:29:17.707", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-18T10:15:09.710", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3196" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Manipulaci\u00f3n de informaci\u00f3n confidencial debido a un Cross-Site Request Forgery (CSRF). Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la build 35979." } ], "id": "CVE-2023-44160", "lastModified": "2024-11-21T08:25:20.730", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:38.223", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4083" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Manipulaci\u00f3n de informaci\u00f3n confidencial debido a un Cross-Site Request Forgery (CSRF). Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la build 35979." } ], "id": "CVE-2023-44161", "lastModified": "2024-11-21T08:25:20.857", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:38.323", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4084" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-15 11:15
Modified
2025-02-04 17:05
Severity ?
Summary
Excessive attack surface in acep-importer service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-7285 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 16 | |
acronis | cyber_protect | 16 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1C021-5866-4826-B27B-842D949D552C", "versionEndIncluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Excessive attack surface in acep-importer service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." }, { "lang": "es", "value": "Superficie de ataque excesiva en el servicio acep-importer debido a la vinculaci\u00f3n a una direcci\u00f3n IP sin restricciones. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (Linux, Windows) antes de la compilaci\u00f3n 38690." } ], "id": "CVE-2024-49383", "lastModified": "2025-02-04T17:05:52.290", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-15T11:15:13.423", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-7285" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1327" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-31 18:15
Modified
2024-11-21 08:21
Severity ?
Summary
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-2008 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-2008 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
apple | macos | - | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "B291A569-A059-4ABC-8A87-4391B322CD92", "versionEndIncluding": "c22.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "id": "CVE-2023-41745", "lastModified": "2024-11-21T08:21:36.653", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-31T18:15:09.373", "references": [ { "source": "security@acronis.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2008" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Vulnerabilidad de cross-site scripting (XSS) almacenada en el nombre del plan de protecci\u00f3n. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la build 35979." } ], "id": "CVE-2023-44207", "lastModified": "2024-11-21T08:25:26.543", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 5.2, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:39.477", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5914" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-22 03:15
Modified
2024-11-21 05:27
Severity ?
Summary
An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. Because the local notification service misconfigures CORS, information disclosure can occur.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm | Release Notes, Third Party Advisory | |
cve@mitre.org | https://www.acronis.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.acronis.com | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. Because the local notification service misconfigures CORS, information disclosure can occur." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Acronis Cyber ??Protect versiones anteriores a 15 Update 1 build 26172. Debido a que el servicio de notificaci\u00f3n local configura inapropiadamente CORS, puede ocurrir una divulgaci\u00f3n de informaci\u00f3n" } ], "id": "CVE-2020-35556", "lastModified": "2024-11-21T05:27:33.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-22T03:15:14.073", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.acronis.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.acronis.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Divulgaci\u00f3n de informaci\u00f3n confidencial debido a spell-jacking. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la build 35979." } ], "id": "CVE-2023-44156", "lastModified": "2024-11-21T08:25:20.200", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:37.817", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5124" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-359" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-12 14:15
Modified
2024-11-21 06:16
Severity ?
Summary
Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://kb.acronis.com/content/68564 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.acronis.com/content/68564 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking." }, { "lang": "es", "value": "Acronis Cyber Protect 15 para Windows anterior a versi\u00f3n build 27009, permit\u00eda una escalada de privilegios local por medio de un secuestro de binarios" } ], "id": "CVE-2021-38088", "lastModified": "2024-11-21T06:16:20.583", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-12T14:15:07.190", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.acronis.com/content/68564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.acronis.com/content/68564" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-18 10:15
Modified
2024-11-21 07:29
Severity ?
Summary
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30430, Acronis Cyber Protect 15 (Windows) before build 30984.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DACDA03-969F-489C-B420-37BED81D9C39", "versionEndExcluding": "c21.09", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30430, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "id": "CVE-2022-45452", "lastModified": "2024-11-21T07:29:16.940", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-18T10:15:09.487", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3967" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Divulgaci\u00f3n y manipulaci\u00f3n de informaci\u00f3n sensible por autorizaci\u00f3n indebida. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la compilaci\u00f3n 35979." } ], "id": "CVE-2023-44206", "lastModified": "2024-11-21T08:25:26.413", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:39.407", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5839" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-27 17:15
Modified
2025-02-06 16:18
Severity ?
Summary
Self cross-site scripting (XSS) vulnerability in storage nodes search field. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177E8F9-8A8D-44D1-AE51-BD877353AA9B", "versionEndExcluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Self cross-site scripting (XSS) vulnerability in storage nodes search field. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391." }, { "lang": "es", "value": "Vulnerabilidad de cross-site scripting (XSS) en el campo de b\u00fasqueda de nodos de almacenamiento. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (Linux, Windows) antes de la compilaci\u00f3n 37391." } ], "id": "CVE-2023-48681", "lastModified": "2025-02-06T16:18:20.597", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 0.5, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-27T17:15:10.957", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5900" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5900" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@acronis.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-13 10:15
Modified
2024-11-21 07:29
Severity ?
Summary
Local privilege escalation due to incomplete uninstallation cleanup. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107, Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect_home_office | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "153D2368-8196-43CD-9EC6-74B995006923", "versionEndExcluding": "c22.07", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*", "matchCriteriaId": "8418AF63-E280-4CE2-8E5C-DCD00ABE6557", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to incomplete uninstallation cleanup. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107, Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "id": "CVE-2022-45455", "lastModified": "2024-11-21T07:29:17.260", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.3, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-13T10:15:14.563", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4459" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-29 19:15
Modified
2024-11-21 06:30
Severity ?
Summary
Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-3167 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-3167 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) era posible en las ventanas emergentes de notificaci\u00f3n. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows, Linux) versiones anteriores a la compilaci\u00f3n 28035" } ], "id": "CVE-2021-44201", "lastModified": "2024-11-21T06:30:33.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-29T19:15:08.067", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3167" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-15 11:15
Modified
2025-02-04 17:05
Severity ?
Summary
Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-7022 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 16 | |
acronis | cyber_protect | 16 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1C021-5866-4826-B27B-842D949D552C", "versionEndIncluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." }, { "lang": "es", "value": "Transmisi\u00f3n de texto plano de informaci\u00f3n confidencial en el servicio acep-collector. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 16 (Linux, Windows) anterior a la compilaci\u00f3n 38690." } ], "id": "CVE-2024-49387", "lastModified": "2025-02-04T17:05:54.623", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 4.2, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-15T11:15:13.860", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-7022" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "security@acronis.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
apple | macos | - | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." }, { "lang": "es", "value": "Divulgaci\u00f3n de informaci\u00f3n confidencial debido al almacenamiento en texto claro de informaci\u00f3n confidencial en la memoria. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, macOS, Windows) antes de la build 35979." } ], "id": "CVE-2023-44153", "lastModified": "2024-11-21T08:25:19.820", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:37.570", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1994" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-316" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-15 11:15
Modified
2025-02-04 17:05
Severity ?
Summary
Excessive attack surface in archive-server service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-7286 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 16 | |
acronis | cyber_protect | 16 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1C021-5866-4826-B27B-842D949D552C", "versionEndIncluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Excessive attack surface in archive-server service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." }, { "lang": "es", "value": "Superficie de ataque excesiva en el servicio de servidor de archivos debido a la vinculaci\u00f3n a una direcci\u00f3n IP sin restricciones. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (Linux, Windows) antes de la compilaci\u00f3n 38690." } ], "id": "CVE-2024-49382", "lastModified": "2025-02-04T17:05:56.980", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-15T11:15:13.153", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-7286" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1327" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-31 16:15
Modified
2024-11-21 08:21
Severity ?
Summary
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-4728 | Patch, Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-4728 | Patch, Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
apple | macos | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "81FB9AF4-BC2B-46BE-A2B3-083CD57718FC", "versionEndExcluding": "c22.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979." } ], "id": "CVE-2023-41744", "lastModified": "2024-11-21T08:21:36.503", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-31T16:15:10.343", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4728" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-18 20:15
Modified
2024-11-21 07:03
Severity ?
Summary
Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-2388 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-2388 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240" }, { "lang": "es", "value": "Una transmisi\u00f3n de informaci\u00f3n confidencial en texto sin cifrar. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows) versiones anteriores a 29240" } ], "id": "CVE-2022-30994", "lastModified": "2024-11-21T07:03:40.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-18T20:15:08.497", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2388" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-29 19:15
Modified
2024-11-21 06:30
Severity ?
Summary
DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-2128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-2128 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035" }, { "lang": "es", "value": "Un secuestro de DLL podr\u00eda conllevar a una escalada de privilegios local. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows) versiones anteriores a la compilaci\u00f3n 28035" } ], "id": "CVE-2021-44198", "lastModified": "2024-11-21T06:30:33.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-29T19:15:07.883", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2128" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 06:49
Severity ?
Summary
Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect_home_office | - | |
microsoft | windows | - | |
acronis | true_image | 2021 | |
acronis | true_image | 2021 | |
acronis | true_image | 2021 | |
acronis | true_image | 2021 | |
acronis | true_image | 2021 | |
acronis | true_image | 2021 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "85D71339-7F19-41DC-B6D2-BF776F472EE1", "versionEndExcluding": "c21.06", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*", "matchCriteriaId": "8418AF63-E280-4CE2-8E5C-DCD00ABE6557", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:true_image:2021:-:*:*:*:windows:*:*", "matchCriteriaId": "F7B99318-3AA5-428D-B0D7-106128BDCE78", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:windows:*:*", "matchCriteriaId": "B1CFEB0F-588B-4B88-9169-4ADB6396C1C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_2:*:*:*:windows:*:*", "matchCriteriaId": "54BE6067-0357-4C68-AA06-CB5EEA3DD86F", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:windows:*:*", "matchCriteriaId": "02D1EBBC-47EE-4C46-AA69-DD0B7DE1B173", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_4:*:*:*:windows:*:*", "matchCriteriaId": "0CF1A7BF-9B93-4D7C-BCD8-30DEF789B46B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:true_image:2021:update_5:*:*:*:windows:*:*", "matchCriteriaId": "B55B6ED7-C602-4C7B-88C5-B0499D61EB1E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" }, { "lang": "es", "value": "Una escalada de privilegios local debido a permisos excesivos asignados a los procesos hijos. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows) versiones anteriores a la compilaci\u00f3n 28035, Acronis Agent (Windows) versiones anteriores a la compilaci\u00f3n 27147, Acronis Cyber Protect Home Office (Windows) versiones anteriores a la compilaci\u00f3n 39612, Acronis True Image 2021 (Windows) versiones anteriores a la compilaci\u00f3n 39287" } ], "id": "CVE-2022-24113", "lastModified": "2024-11-21T06:49:49.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-04T23:15:15.997", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2881" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-250" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-15 11:15
Modified
2025-02-04 17:05
Severity ?
Summary
Excessive attack surface in acep-collector service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-7284 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 16 | |
acronis | cyber_protect | 16 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EC1C021-5866-4826-B27B-842D949D552C", "versionEndIncluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Excessive attack surface in acep-collector service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." }, { "lang": "es", "value": "Superficie de ataque excesiva en el servicio acep-collector debido a la vinculaci\u00f3n a una direcci\u00f3n IP sin restricciones. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (Linux, Windows) antes de la compilaci\u00f3n 38690." } ], "id": "CVE-2024-49384", "lastModified": "2025-02-04T17:05:59.647", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-15T11:15:13.643", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-7284" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1327" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-18 10:15
Modified
2024-11-21 07:29
Severity ?
Summary
Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 29633, Acronis Cyber Protect 15 (Windows, macOS, Linux) before build 30984.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
apple | macos | - | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C7EE37-2B7F-4401-9F7F-54EA2C5D04AE", "versionEndExcluding": "c22.05", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 29633, Acronis Cyber Protect 15 (Windows, macOS, Linux) before build 30984." } ], "id": "CVE-2022-45458", "lastModified": "2024-11-21T07:29:17.590", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 2.5, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-18T10:15:09.657", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3952" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-29 19:15
Modified
2024-11-21 06:30
Severity ?
Summary
Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-3294 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-3294 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" }, { "lang": "es", "value": "Era posible una vulnerabilidad de tipo cross-site scripting (XSS) almacenado en los detalles del plan de protecci\u00f3n. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows, Linux) versiones anteriores a la compilaci\u00f3n 28035" } ], "id": "CVE-2021-44203", "lastModified": "2024-11-21T06:30:34.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-29T19:15:08.163", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3294" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-18 10:15
Modified
2024-11-21 07:29
Severity ?
Summary
TLS/SSL weak cipher suites enabled. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 30984.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TLS/SSL weak cipher suites enabled. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 30984." } ], "id": "CVE-2022-45453", "lastModified": "2024-11-21T07:29:17.047", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-18T10:15:09.547", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5112" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-18 10:15
Modified
2024-11-21 07:29
Severity ?
Summary
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 28610, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 30984.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
apple | macos | - | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BA43BB6-F08A-4E5B-980E-7794FADB51DE", "versionEndExcluding": "c21.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 28610, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 30984." } ], "id": "CVE-2022-45450", "lastModified": "2024-11-21T07:29:16.690", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-18T10:15:09.413", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2410" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-31 21:15
Modified
2024-11-21 08:21
Severity ?
Summary
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "9483096A-532A-45C4-925A-657C8B4C5FCF", "versionEndExcluding": "c23.03", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979." }, { "lang": "es", "value": "Divulgaci\u00f3n de informaci\u00f3n sensible debido a la recopilaci\u00f3n excesiva de informaci\u00f3n del sistema. Los siguientes productos se ven afectados: Acronis Agent (Windows) antes de la compilaci\u00f3n 32047, Acronis Cyber ??Protect 15 (Windows) antes de la compilaci\u00f3n 35979." } ], "id": "CVE-2023-41749", "lastModified": "2024-11-21T08:21:37.243", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-31T21:15:08.583", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5287" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-12 14:15
Modified
2024-11-21 06:16
Severity ?
Summary
Reflected cross-site scripting (XSS) was possible on the login page in Acronis Cyber Protect 15 prior to build 27009.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://kb.acronis.com/content/68564 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.acronis.com/content/68564 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Reflected cross-site scripting (XSS) was possible on the login page in Acronis Cyber Protect 15 prior to build 27009." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) reflejado era posible en la p\u00e1gina de inicio de sesi\u00f3n de Acronis Cyber Protect 15 anterior a versi\u00f3n build 27009" } ], "id": "CVE-2021-38087", "lastModified": "2024-11-21T06:16:20.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-12T14:15:07.153", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.acronis.com/content/68564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.acronis.com/content/68564" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-29 19:15
Modified
2024-11-21 06:30
Severity ?
Summary
Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-2803 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-2803 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" }, { "lang": "es", "value": "Era posible una vulnerabilidad de tipo cross-site scripting (XSS) propio en la p\u00e1gina de dispositivos. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows, Linux) versiones anteriores a la compilaci\u00f3n 28035" } ], "id": "CVE-2021-44200", "lastModified": "2024-11-21T06:30:33.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-29T19:15:08.017", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2803" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Divulgaci\u00f3n de informaci\u00f3n confidencial debido al almacenamiento en texto claro de informaci\u00f3n confidencial. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la build 35979." } ], "id": "CVE-2023-44159", "lastModified": "2024-11-21T08:25:20.597", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:38.063", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5787" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-27 17:15
Modified
2025-02-06 16:32
Severity ?
Summary
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177E8F9-8A8D-44D1-AE51-BD877353AA9B", "versionEndExcluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391." }, { "lang": "es", "value": "Divulgaci\u00f3n de informaci\u00f3n confidencial debido a permisos de carpetas inseguros. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (Linux, Windows) antes de la compilaci\u00f3n 37391." } ], "id": "CVE-2023-48678", "lastModified": "2025-02-06T16:32:10.827", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-27T17:15:10.427", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2319" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "security@acronis.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-18 10:15
Modified
2024-11-21 07:29
Severity ?
Summary
Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows) before build 29633, Acronis Cyber Protect 15 (Windows) before build 30984.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C7EE37-2B7F-4401-9F7F-54EA2C5D04AE", "versionEndExcluding": "c22.05", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows) before build 29633, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "id": "CVE-2022-45457", "lastModified": "2024-11-21T07:29:17.483", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 2.5, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-18T10:15:09.603", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3957" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Divulgaci\u00f3n de informaci\u00f3n sensible por autorizaci\u00f3n inadecuada. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la compilaci\u00f3n 35979." } ], "id": "CVE-2023-44205", "lastModified": "2024-11-21T08:25:26.293", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:39.313", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4321" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-27 17:15
Modified
2025-02-06 16:16
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in unit name. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177E8F9-8A8D-44D1-AE51-BD877353AA9B", "versionEndExcluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) vulnerability in unit name. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391." }, { "lang": "es", "value": "Vulnerabilidad de cross-site scripting (XSS) almacenado en el nombre de la unidad. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (Linux, Windows) antes de la compilaci\u00f3n 37391." } ], "id": "CVE-2023-48682", "lastModified": "2025-02-06T16:16:31.447", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 5.2, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-27T17:15:11.130", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5901" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@acronis.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-29 19:15
Modified
2024-11-21 06:30
Severity ?
Summary
Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-3283 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-3283 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" }, { "lang": "es", "value": "Era posible una vulnerabilidad de tipo cross-site scripting (XSS) almacenado en los detalles de la actividad. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows, Linux) versiones anteriores a la compilaci\u00f3n 28035" } ], "id": "CVE-2021-44202", "lastModified": "2024-11-21T06:30:34.013", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-29T19:15:08.117", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3283" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3283" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-18 20:15
Modified
2024-11-21 07:03
Severity ?
Summary
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-2299 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-2299 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - | |
acronis | agent | * | |
linux | linux_kernel | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E966A4-23C1-4E31-A8BB-AB701F0559C7", "versionEndExcluding": "c21.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037" }, { "lang": "es", "value": "Una divulgaci\u00f3n de informaci\u00f3n confidencial debido a permisos de carpetas no seguras. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Linux) versiones anteriores a compilaci\u00f3n 29240, Acronis Agent (Linux) versiones anteriores a compilaci\u00f3n 28037" } ], "id": "CVE-2022-30990", "lastModified": "2024-11-21T07:03:40.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-18T20:15:08.283", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2299" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2299" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-27 17:15
Modified
2025-02-06 16:30
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177E8F9-8A8D-44D1-AE51-BD877353AA9B", "versionEndExcluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391." }, { "lang": "es", "value": "Vulnerabilidad de cross-site scripting (XSS) almacenadas debido a la falta de validaci\u00f3n de origen en postMessage. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (Linux, Windows) antes de la compilaci\u00f3n 37391." } ], "id": "CVE-2023-48679", "lastModified": "2025-02-06T16:30:48.253", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-27T17:15:10.617", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3469" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3469" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@acronis.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-22 03:15
Modified
2024-11-21 05:27
Severity ?
Summary
An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm | Release Notes, Third Party Advisory | |
cve@mitre.org | https://www.acronis.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.acronis.com | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Acronis Cyber ??Protect versiones anteriores a 15 Update 1 build 26172. Se presenta una vulnerabilidad de tipo cross-site scripting (XSS) en la consola" } ], "id": "CVE-2020-35664", "lastModified": "2024-11-21T05:27:47.813", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-22T03:15:14.247", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.acronis.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.acronis.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-12 14:15
Modified
2024-11-21 06:16
Severity ?
Summary
Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://kb.acronis.com/content/68564 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.acronis.com/content/68564 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking." }, { "lang": "es", "value": "Acronis Cyber Protect versiones 15 para Windows anterior a versi\u00f3n build 27009 y Acronis Agent para Windows anterior a versi\u00f3n build 26226, permit\u00edan una escalada de privilegios local por medio de un secuestro DLL" } ], "id": "CVE-2021-38086", "lastModified": "2024-11-21T06:16:20.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-12T14:15:07.117", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.acronis.com/content/68564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.acronis.com/content/68564" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-31 16:15
Modified
2024-11-21 08:21
Severity ?
Summary
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/SEC-4858 | Release Notes, Vendor Advisory | |
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-5487 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/SEC-4858 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-5487 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect_home_office | - | |
acronis | cyber_protect_home_office | 39900 | |
acronis | cyber_protect_home_office | 40107 | |
acronis | cyber_protect_home_office | 40173 | |
acronis | cyber_protect_home_office | 40208 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F4ABAEF-E87F-40CF-B8DA-5E70F9A480B1", "versionEndExcluding": "c23.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*", "matchCriteriaId": "8418AF63-E280-4CE2-8E5C-DCD00ABE6557", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:39900:*:*:*:*:*:*:*", "matchCriteriaId": "E0894339-A1AD-4382-A4B0-C13FEDE1F076", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:40107:*:*:*:*:*:*:*", "matchCriteriaId": "6DE560C6-2EC0-4C58-AA31-B15512F45877", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:40173:*:*:*:*:*:*:*", "matchCriteriaId": "E47F65B4-ACD6-4507-9242-35530163A730", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:40208:*:*:*:*:*:*:*", "matchCriteriaId": "EE9F5E36-F752-4C7C-A678-D5B596A71C67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979." }, { "lang": "es", "value": "Escalada de privilegios locales debido a permisos inseguros del puerto de comunicaci\u00f3n del conductor. Los siguientes productos se ven afectados: Acronis Cyber ??Protect Home Office (Windows) antes de la compilaci\u00f3n 40278, Acronis Agent (Windows) antes de la compilaci\u00f3n 31637, Acronis Cyber ??Protect 15 (Windows) antes de la compilaci\u00f3n 35979." } ], "id": "CVE-2023-41743", "lastModified": "2024-11-21T08:21:36.350", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-31T16:15:10.270", "references": [ { "source": "security@acronis.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/SEC-4858" }, { "source": "security@acronis.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/SEC-4858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5487" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Se filtra informaci\u00f3n confidencial a trav\u00e9s de archivos de log. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la build 35979." } ], "id": "CVE-2023-44155", "lastModified": "2024-11-21T08:25:20.077", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:37.730", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3471" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3471" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Divulgaci\u00f3n y manipulaci\u00f3n de informaci\u00f3n sensible por autorizaci\u00f3n indebida. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la build 35979." } ], "id": "CVE-2023-44154", "lastModified": "2024-11-21T08:25:19.950", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:37.650", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2436" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-03 11:15
Modified
2024-11-21 07:03
Severity ?
Summary
Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "3117B8C4-C8E6-4F50-923D-5BF50222337D", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:10130:*:*:*:*:*:*", "matchCriteriaId": "C2ECE37D-291E-4D07-9D8B-79D09D78FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:10330:*:*:*:*:*:*", "matchCriteriaId": "9826E331-15CB-454D-80E6-B39B380894F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:11010:*:*:*:*:*:*", "matchCriteriaId": "89A4839A-EF22-4E28-82ED-5828207D7ADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:13160:*:*:*:*:*:*", "matchCriteriaId": "A847D357-EB6F-4CBF-AEB7-20ABF6B6A0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:13400:*:*:*:*:*:*", "matchCriteriaId": "6677430F-19A5-4D7A-91F5-9D906DC48174", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:14280:*:*:*:*:*:*", "matchCriteriaId": "C38873F8-EB4E-4B20-B4BB-A8E9CC2E4FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:14330:*:*:*:*:*:*", "matchCriteriaId": "00644AD1-6114-4470-8AD6-C2D975329A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:16180:*:*:*:*:*:*", "matchCriteriaId": "49694CEB-C054-4D02-A7BA-D57E7A1538C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:16318:*:*:*:*:*:*", "matchCriteriaId": "3FE3F243-202A-4EF5-B4B8-F912B6763F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:16327:*:*:*:*:*:*", "matchCriteriaId": "D5831900-150B-4DAD-A17D-C974F8F91C8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:7641:*:*:*:*:*:*", "matchCriteriaId": "3F540D84-5562-41AE-9294-64F19596149E", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:7970:*:*:*:*:*:*", "matchCriteriaId": "122DEB91-6506-4F94-9C79-887EECE68A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:8850:*:*:*:*:*:*", "matchCriteriaId": "0B6EA731-C344-424E-B5FB-291CD59DDAB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:9010:*:*:*:*:*:*", "matchCriteriaId": "EF144B8E-E42F-41E3-8E23-88B1F862D14A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545." } ], "id": "CVE-2022-30995", "lastModified": "2024-11-21T07:03:40.847", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.8, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-03T11:15:11.193", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3855" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-18 20:15
Modified
2024-11-21 07:03
Severity ?
Summary
Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-2441 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-2441 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" }, { "lang": "es", "value": "Una transmisi\u00f3n de informaci\u00f3n confidencial en texto sin cifrar. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Linux, Windows) versiones anteriores a 29240" } ], "id": "CVE-2022-30993", "lastModified": "2024-11-21T07:03:40.640", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-18T20:15:08.447", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2441" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-21 14:15
Modified
2024-11-21 04:54
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
References
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | https://www.kb.cert.org/vuls/id/114757 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/114757 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_backup | * | |
acronis | cyber_protect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_backup:*:*:*:*:*:*:*:*", "matchCriteriaId": "D50B1D5A-751B-43C6-A5DE-681B242A1874", "versionEndExcluding": "12.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\\jenkins_agent\\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges." }, { "lang": "es", "value": "Acronis Cyber ??Backup versi\u00f3n 12.5 y Cyber ??Protect versi\u00f3n 15 incluyen un componente OpenSSL que especifica una variable OPENSSLDIR como un subdirectorio dentro de C:\\jenkins_agent\\.\u0026#xa0;Acronis Cyber ??Backup y Cyber ??Protect contienen un servicio privilegiado que usa este componente de OpenSSL.\u0026#xa0;Debido a que los usuarios de Windows no privilegiados pueden crear subdirectorios fuera del root del sistema, un usuario puede crear la ruta apropiada a un archivo openssl.cnf especialmente dise\u00f1ado para lograr una ejecuci\u00f3n de c\u00f3digo arbitraria con privilegios del SYSTEM" } ], "id": "CVE-2020-10138", "lastModified": "2024-11-21T04:54:53.767", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "cret@cert.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-21T14:15:15.013", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/114757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/114757" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-27 15:19
Modified
2024-11-21 08:25
Severity ?
Summary
Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*", "matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*", "matchCriteriaId": "69506F27-DEF8-4317-9E54-D79CA430AD4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." }, { "lang": "es", "value": "Divulgaci\u00f3n de informaci\u00f3n confidencial debido a un enmascaramiento insuficiente del campo token. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la build 35979." } ], "id": "CVE-2023-44158", "lastModified": "2024-11-21T08:25:20.467", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-27T15:19:37.980", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4071" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-03 11:15
Modified
2024-11-21 07:19
Severity ?
Summary
Code execution and sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://herolab.usd.de/security-advisories/usd-2022-0008/ | Exploit, Third Party Advisory | |
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-4092 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://herolab.usd.de/security-advisories/usd-2022-0008/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-4092 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_backup | 12.5 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:-:*:*:*:*:*:*", "matchCriteriaId": "3117B8C4-C8E6-4F50-923D-5BF50222337D", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:10130:*:*:*:*:*:*", "matchCriteriaId": "C2ECE37D-291E-4D07-9D8B-79D09D78FA35", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:10330:*:*:*:*:*:*", "matchCriteriaId": "9826E331-15CB-454D-80E6-B39B380894F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:11010:*:*:*:*:*:*", "matchCriteriaId": "89A4839A-EF22-4E28-82ED-5828207D7ADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:13160:*:*:*:*:*:*", "matchCriteriaId": "A847D357-EB6F-4CBF-AEB7-20ABF6B6A0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:13400:*:*:*:*:*:*", "matchCriteriaId": "6677430F-19A5-4D7A-91F5-9D906DC48174", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:14280:*:*:*:*:*:*", "matchCriteriaId": "C38873F8-EB4E-4B20-B4BB-A8E9CC2E4FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:14330:*:*:*:*:*:*", "matchCriteriaId": "00644AD1-6114-4470-8AD6-C2D975329A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:16180:*:*:*:*:*:*", "matchCriteriaId": "49694CEB-C054-4D02-A7BA-D57E7A1538C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:16318:*:*:*:*:*:*", "matchCriteriaId": "3FE3F243-202A-4EF5-B4B8-F912B6763F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:16327:*:*:*:*:*:*", "matchCriteriaId": "D5831900-150B-4DAD-A17D-C974F8F91C8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:7641:*:*:*:*:*:*", "matchCriteriaId": "3F540D84-5562-41AE-9294-64F19596149E", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:7970:*:*:*:*:*:*", "matchCriteriaId": "122DEB91-6506-4F94-9C79-887EECE68A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:8850:*:*:*:*:*:*", "matchCriteriaId": "0B6EA731-C344-424E-B5FB-291CD59DDAB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_backup:12.5:9010:*:*:*:*:*:*", "matchCriteriaId": "EF144B8E-E42F-41E3-8E23-88B1F862D14A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code execution and sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545." } ], "id": "CVE-2022-3405", "lastModified": "2024-11-21T07:19:27.207", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.8, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-03T11:15:11.650", "references": [ { "source": "security@acronis.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://herolab.usd.de/security-advisories/usd-2022-0008/" }, { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://herolab.usd.de/security-advisories/usd-2022-0008/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4092" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-18 20:15
Modified
2024-11-21 07:03
Severity ?
Summary
Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-2917 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-2917 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*", "matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" }, { "lang": "es", "value": "Un redireccionamiento abierto por medio de un par\u00e1metro de consulta controlado por el usuario. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Linux, Windows) versiones anteriores a 29240" } ], "id": "CVE-2022-30992", "lastModified": "2024-11-21T07:03:40.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-18T20:15:08.393", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2917" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-27 17:15
Modified
2025-02-06 16:29
Severity ?
Summary
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Cyber Protect 16 (macOS, Windows) before build 37391.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177E8F9-8A8D-44D1-AE51-BD877353AA9B", "versionEndExcluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Cyber Protect 16 (macOS, Windows) before build 37391." }, { "lang": "es", "value": "Divulgaci\u00f3n de informaci\u00f3n sensible debido a la recopilaci\u00f3n excesiva de informaci\u00f3n del sistema. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (macOS, Windows) antes de la compilaci\u00f3n 37391." } ], "id": "CVE-2023-48680", "lastModified": "2025-02-06T16:29:47.807", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "security@acronis.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-27T17:15:10.793", "references": [ { "source": "security@acronis.com", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5392" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-359" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-29 19:15
Modified
2024-11-21 06:30
Severity ?
Summary
DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612
References
▼ | URL | Tags | |
---|---|---|---|
security@acronis.com | https://security-advisory.acronis.com/advisories/SEC-2508 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-advisory.acronis.com/advisories/SEC-2508 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
acronis | agent | - | |
acronis | cyber_protect | * | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect | 15 | |
acronis | cyber_protect_home_office | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C67D74A-C2E3-4751-A906-D5B1371AA72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*", "matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6", "versionEndExcluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*", "matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*", "matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*", "matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*", "matchCriteriaId": "8418AF63-E280-4CE2-8E5C-DCD00ABE6557", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612" }, { "lang": "es", "value": "Un secuestro de DLL pod\u00eda conllevar a una denegaci\u00f3n de servicio. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows) versiones anteriores a la compilaci\u00f3n 28035, Acronis Agent (Windows) versiones anteriores a la compilaci\u00f3n 27305, Acronis Cyber Protect Home Office (Windows) versiones anteriores a la compilaci\u00f3n 39612" } ], "id": "CVE-2021-44199", "lastModified": "2024-11-21T06:30:33.537", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-29T19:15:07.963", "references": [ { "source": "security@acronis.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2508" } ], "sourceIdentifier": "security@acronis.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "security@acronis.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2023-44157
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:08
Severity ?
EPSS score ?
Summary
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3956 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3956", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3956" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44157", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:39.391223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:08:04.787Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:01:02.383Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3956", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3956" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44157", "datePublished": "2023-09-27T12:01:02.383Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:08:04.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44198
Vulnerability from cvelistv5
Published
2021-11-29 18:18
Modified
2024-09-16 20:27
Severity ?
EPSS score ?
Summary
DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2128 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@vanitas (https://hackerone.com/vanitas)" }, { "lang": "en", "value": "@vasebur (https://hackerone.com/vasebur)" }, { "lang": "en", "value": "@mmg (https://hackerone.com/mmg)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:18:56", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2128" } ], "source": { "advisory": "SEC-2128", "defect": [ "SEC-2128" ], "discovery": "EXTERNAL" }, "title": "DLL hijacking could lead to local privilege escalation", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44198", "STATE": "PUBLIC", "TITLE": "DLL hijacking could lead to local privilege escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@vanitas (https://hackerone.com/vanitas)" }, { "lang": "eng", "value": "@vasebur (https://hackerone.com/vasebur)" }, { "lang": "eng", "value": "@mmg (https://hackerone.com/mmg)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2128", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2128" } ] }, "source": { "advisory": "SEC-2128", "defect": [ "SEC-2128" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44198", "datePublished": "2021-11-29T18:18:56.612364Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-16T20:27:10.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44160
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-08-02 19:59
Severity ?
EPSS score ?
Summary
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-4083 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-44160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T13:28:36.994222Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T20:32:04.510Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4083", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4083" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@laz0rde (https://hackerone.com/laz0rde)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4083", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4083" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44160", "datePublished": "2023-09-27T12:01:23.677Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-08-02T19:59:50.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44206
Vulnerability from cvelistv5
Published
2023-09-27 12:02
Modified
2024-09-23 20:13
Severity ?
EPSS score ?
Summary
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5839 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5839", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5839" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:acronis:cyber_protect:15:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cyber_protect", "vendor": "acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "15", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-44206", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:12:08.740528Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:13:38.682Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@theelgo64 (https://hackerone.com/theelgo64)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:02:16.923Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5839", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5839" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44206", "datePublished": "2023-09-27T12:02:16.923Z", "dateReserved": "2023-09-26T20:08:46.834Z", "dateUpdated": "2024-09-23T20:13:38.682Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35664
Vulnerability from cvelistv5
Published
2021-02-22 02:13
Modified
2024-08-04 17:09
Severity ?
EPSS score ?
Summary
An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console.
References
▼ | URL | Tags |
---|---|---|
https://www.acronis.com | x_refsource_MISC | |
https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:09:14.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.acronis.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-22T02:13:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.acronis.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35664", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.acronis.com", "refsource": "MISC", "url": "https://www.acronis.com" }, { "name": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm", "refsource": "MISC", "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35664", "datePublished": "2021-02-22T02:13:33", "dateReserved": "2020-12-23T00:00:00", "dateUpdated": "2024-08-04T17:09:14.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45452
Vulnerability from cvelistv5
Published
2023-05-18 09:21
Modified
2025-01-22 14:44
Severity ?
EPSS score ?
Summary
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30430, Acronis Cyber Protect 15 (Windows) before build 30984.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3967 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:00.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3967", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3967" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45452", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T14:44:16.653287Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T14:44:25.933Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30430", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@netero1010 (https://hackerone.com/netero1010)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30430, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:21:55.932Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3967", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3967" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45452", "datePublished": "2023-05-18T09:21:55.932Z", "dateReserved": "2022-11-16T16:45:58.650Z", "dateUpdated": "2025-01-22T14:44:25.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44204
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-17 01:12
Severity ?
EPSS score ?
Summary
Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2355 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2355" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "27147", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "39612", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis True Image 2021", "vendor": "Acronis", "versions": [ { "lessThan": "39287", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@xnand (https://hackerone.com/xnand)" } ], "datePublic": "2022-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-04T22:29:33", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2355" } ], "source": { "advisory": "SEC-2355", "defect": [ "SEC-2355" ], "discovery": "EXTERNAL" }, "title": "Local privilege escalation via named pipe due to improper access control checks", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2021-44204", "STATE": "PUBLIC", "TITLE": "Local privilege escalation via named pipe due to improper access control checks" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" } ] } }, { "product_name": "Acronis Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "27147" } ] } }, { "product_name": "Acronis Cyber Protect Home Office", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39612" } ] } }, { "product_name": "Acronis True Image 2021", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39287" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@xnand (https://hackerone.com/xnand)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2355", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2355" } ] }, "source": { "advisory": "SEC-2355", "defect": [ "SEC-2355" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44204", "datePublished": "2022-02-04T22:29:33.071413Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-17T01:12:21.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30993
Vulnerability from cvelistv5
Published
2022-05-18 19:42
Modified
2024-09-17 04:20
Severity ?
EPSS score ?
Summary
Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2441 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2441" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:42:02", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2441" } ], "source": { "advisory": "SEC-2441", "defect": [ "SEC-2441" ], "discovery": "INTERNAL" }, "title": "Cleartext transmission of sensitive information", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30993", "STATE": "PUBLIC", "TITLE": "Cleartext transmission of sensitive information" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "29240" }, { "platform": "Windows", "version_affected": "\u003c", "version_value": "29240" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2441", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2441" } ] }, "source": { "advisory": "SEC-2441", "defect": [ "SEC-2441" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30993", "datePublished": "2022-05-18T19:42:02.470306Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-17T04:20:12.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30995
Vulnerability from cvelistv5
Published
2023-05-03 10:50
Modified
2025-01-30 15:19
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3855 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3855", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3855" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-30995", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-30T15:19:22.624037Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-30T15:19:32.564Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29486", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Backup 12.5", "vendor": "Acronis", "versions": [ { "lessThan": "16545", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@boldglum (https://hackerone.com/boldglum)" }, { "lang": "en", "type": "finder", "value": "Sandro Tolksdorf of usd AG (https://herolab.usd.de)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.3, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-03T10:50:45.883Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3855", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3855" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30995", "datePublished": "2023-05-03T10:50:45.883Z", "dateReserved": "2022-05-18T07:09:14.532Z", "dateUpdated": "2025-01-30T15:19:32.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44161
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:07
Severity ?
EPSS score ?
Summary
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-4084 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4084", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4084" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44161", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:21.883180Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:07:11.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@laz0rde (https://hackerone.com/laz0rde)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4084", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4084" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44161", "datePublished": "2023-09-27T12:01:35.358Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:07:11.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44156
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:06
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5124 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5124", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5124" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44156", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:06.746293Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:06:33.949Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T15:48:36.646Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5124", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5124" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44156", "datePublished": "2023-09-27T12:01:56.823Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:06:33.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30991
Vulnerability from cvelistv5
Published
2022-05-18 19:43
Modified
2024-09-17 01:46
Severity ?
EPSS score ?
Summary
HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3928 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3928" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@netero1010 (https://hackerone.com/netero1010)" } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:43:14", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3928" } ], "source": { "advisory": "SEC-3928", "defect": [ "SEC-3928" ], "discovery": "EXTERNAL" }, "title": "HTML injection via report name", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30991", "STATE": "PUBLIC", "TITLE": "HTML injection via report name" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "29240" }, { "platform": "Windows", "version_affected": "\u003c", "version_value": "29240" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@netero1010 (https://hackerone.com/netero1010)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-3928", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-3928" } ] }, "source": { "advisory": "SEC-3928", "defect": [ "SEC-3928" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30991", "datePublished": "2022-05-18T19:43:14.157456Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-17T01:46:35.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45457
Vulnerability from cvelistv5
Published
2023-05-18 09:23
Modified
2025-01-22 14:43
Severity ?
EPSS score ?
Summary
Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows) before build 29633, Acronis Cyber Protect 15 (Windows) before build 30984.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3957 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.533Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3957", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3957" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45457", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T14:43:35.259080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T14:43:42.077Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "29633", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows) before build 29633, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:23:51.453Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3957", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3957" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45457", "datePublished": "2023-05-18T09:23:51.453Z", "dateReserved": "2022-11-16T16:45:58.652Z", "dateUpdated": "2025-01-22T14:43:42.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44159
Vulnerability from cvelistv5
Published
2023-09-27 12:02
Modified
2024-09-23 18:06
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5787 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.005Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5787", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5787" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44159", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:30:58.152838Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:06:19.272Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:02:06.679Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5787", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5787" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44159", "datePublished": "2023-09-27T12:02:06.679Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:06:19.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30994
Vulnerability from cvelistv5
Published
2022-05-18 19:41
Modified
2024-09-17 02:06
Severity ?
EPSS score ?
Summary
Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2388 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2388" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:41:32", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2388" } ], "source": { "advisory": "SEC-2388", "defect": [ "SEC-2388" ], "discovery": "INTERNAL" }, "title": "Cleartext transmission of sensitive information", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30994", "STATE": "PUBLIC", "TITLE": "Cleartext transmission of sensitive information" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "29240" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2388", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2388" } ] }, "source": { "advisory": "SEC-2388", "defect": [ "SEC-2388" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30994", "datePublished": "2022-05-18T19:41:32.839531Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-17T02:06:03.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48679
Vulnerability from cvelistv5
Published
2024-02-27 16:45
Modified
2024-08-02 21:37
Severity ?
EPSS score ?
Summary
Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3469 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-48679", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-27T20:09:50.662424Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:04.820Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:54.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3469", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3469" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "37391", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T17:06:47.223Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3469", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3469" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-48679", "datePublished": "2024-02-27T16:45:53.340Z", "dateReserved": "2023-11-17T14:33:30.399Z", "dateUpdated": "2024-08-02T21:37:54.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44154
Vulnerability from cvelistv5
Published
2023-09-27 12:00
Modified
2024-09-23 19:26
Severity ?
EPSS score ?
Summary
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2436 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.234Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-2436", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2436" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44154", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T19:26:05.033286Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T19:26:20.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-28T08:12:49.829Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-2436", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2436" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44154", "datePublished": "2023-09-27T12:00:34.428Z", "dateReserved": "2023-09-26T13:09:58.802Z", "dateUpdated": "2024-09-23T19:26:20.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44199
Vulnerability from cvelistv5
Published
2021-11-29 18:19
Modified
2024-09-16 22:20
Severity ?
EPSS score ?
Summary
DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2508 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.842Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2508" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "27305", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "39612", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:19:12", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2508" } ], "source": { "advisory": "SEC-2508", "defect": [ "SEC-2508" ], "discovery": "INTERNAL" }, "title": "DLL hijacking could lead to denial of service", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44199", "STATE": "PUBLIC", "TITLE": "DLL hijacking could lead to denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" } ] } }, { "product_name": "Acronis Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "27305" } ] } }, { "product_name": "Acronis Cyber Protect Home Office", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39612" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2508", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2508" } ] }, "source": { "advisory": "SEC-2508", "defect": [ "SEC-2508" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44199", "datePublished": "2021-11-29T18:19:12.590356Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-16T22:20:30.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41743
Vulnerability from cvelistv5
Published
2023-08-31 15:04
Modified
2024-10-01 17:32
Severity ?
EPSS score ?
Summary
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5487 | vendor-advisory | |
https://security-advisory.acronis.com/SEC-4858 | related |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect Home Office |
Version: unspecified ≤ |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:47.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5487", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5487" }, { "name": "SEC-4858", "tags": [ "related", "x_transferred" ], "url": "https://security-advisory.acronis.com/SEC-4858" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "cyber_protect", "vendor": "acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "cyber_protect_home_office", "vendor": "acronis", "versions": [ { "lessThan": "40278", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:acronis:agent:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "agent", "vendor": "acronis", "versions": [ { "lessThan": "31637", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41743", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T17:29:00.348301Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T17:32:05.640Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "40278", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "31637", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@alfarom256 (https://hackerone.com/alfarom256)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T19:14:03.530Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5487", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5487" }, { "name": "SEC-4858", "tags": [ "related" ], "url": "https://security-advisory.acronis.com/SEC-4858" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41743", "datePublished": "2023-08-31T15:04:10.802Z", "dateReserved": "2023-08-31T14:10:27.638Z", "dateUpdated": "2024-10-01T17:32:05.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41745
Vulnerability from cvelistv5
Published
2023-08-31 17:16
Modified
2024-09-27 14:16
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2008 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:47.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-2008", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2008" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41745", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T13:05:14.356631Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T14:16:25.438Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30991", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T17:16:56.516Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-2008", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2008" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41745", "datePublished": "2023-08-31T17:16:56.516Z", "dateReserved": "2023-08-31T14:10:27.638Z", "dateUpdated": "2024-09-27T14:16:25.438Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44152
Vulnerability from cvelistv5
Published
2023-09-27 11:59
Modified
2024-09-23 18:11
Severity ?
EPSS score ?
Summary
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-1908 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-1908", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1908" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44152", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:58.785593Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:11:17.766Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T15:48:49.986Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-1908", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1908" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44152", "datePublished": "2023-09-27T11:59:56.524Z", "dateReserved": "2023-09-26T13:09:58.802Z", "dateUpdated": "2024-09-23T18:11:17.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30992
Vulnerability from cvelistv5
Published
2022-05-18 19:42
Modified
2024-09-16 19:10
Severity ?
EPSS score ?
Summary
Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2917 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.102Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2917" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:42:45", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2917" } ], "source": { "advisory": "SEC-2917", "defect": [ "SEC-2917" ], "discovery": "INTERNAL" }, "title": "Open redirect via user-controlled query parameter", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30992", "STATE": "PUBLIC", "TITLE": "Open redirect via user-controlled query parameter" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "29240" }, { "platform": "Windows", "version_affected": "\u003c", "version_value": "29240" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2917", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2917" } ] }, "source": { "advisory": "SEC-2917", "defect": [ "SEC-2917" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30992", "datePublished": "2022-05-18T19:42:45.904385Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-16T19:10:09.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-49382
Vulnerability from cvelistv5
Published
2024-10-15 10:32
Modified
2024-10-15 12:46
Severity ?
EPSS score ?
Summary
Excessive attack surface in archive-server service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-7286 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-49382", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T12:46:18.366227Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T12:46:35.938Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "38690", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Excessive attack surface in archive-server service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1327", "description": "CWE-1327", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-15T10:32:55.845Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-7286", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-7286" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2024-49382", "datePublished": "2024-10-15T10:32:55.845Z", "dateReserved": "2024-10-14T15:01:16.473Z", "dateUpdated": "2024-10-15T12:46:35.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-49388
Vulnerability from cvelistv5
Published
2024-10-15 10:34
Modified
2024-10-15 12:47
Severity ?
EPSS score ?
Summary
Sensitive information manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5984 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-49388", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T12:47:34.264102Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T12:47:51.115Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "38690", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-15T10:34:24.960Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5984", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5984" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2024-49388", "datePublished": "2024-10-15T10:34:24.960Z", "dateReserved": "2024-10-14T15:01:16.474Z", "dateUpdated": "2024-10-15T12:47:51.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44203
Vulnerability from cvelistv5
Published
2021-11-29 18:19
Modified
2024-09-16 22:45
Severity ?
EPSS score ?
Summary
Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3294 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@frankiexote (https://hackerone.com/frankiexote)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:19:01", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3294" } ], "source": { "advisory": "SEC-3294", "defect": [ "SEC-3294" ], "discovery": "EXTERNAL" }, "title": "Stored cross-site scripting (XSS) was possible in protection plan details", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44203", "STATE": "PUBLIC", "TITLE": "Stored cross-site scripting (XSS) was possible in protection plan details" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" }, { "platform": "Linux", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@frankiexote (https://hackerone.com/frankiexote)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-3294", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-3294" } ] }, "source": { "advisory": "SEC-3294", "defect": [ "SEC-3294" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44203", "datePublished": "2021-11-29T18:19:01.156130Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-16T22:45:05.734Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44155
Vulnerability from cvelistv5
Published
2023-09-27 12:00
Modified
2024-09-23 18:11
Severity ?
EPSS score ?
Summary
Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3471 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3471", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3471" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44155", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:48.572538Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:11:04.492Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:00:50.339Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3471", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3471" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44155", "datePublished": "2023-09-27T12:00:50.339Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:11:04.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45459
Vulnerability from cvelistv5
Published
2023-05-18 09:26
Modified
2025-01-22 16:18
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to insecure registry permissions. The following products are affected: Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3196 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3196", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3196" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45459", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T16:18:54.800223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T16:18:57.514Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30025", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure registry permissions. The following products are affected: Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:26:22.045Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3196", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3196" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45459", "datePublished": "2023-05-18T09:26:22.045Z", "dateReserved": "2022-11-16T16:45:58.652Z", "dateUpdated": "2025-01-22T16:18:57.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44153
Vulnerability from cvelistv5
Published
2023-09-27 12:00
Modified
2024-09-23 19:26
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-1994 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-1994", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1994" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44153", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T19:26:40.511726Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T19:26:52.210Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-316", "description": "CWE-316", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:00:09.210Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-1994", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1994" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44153", "datePublished": "2023-09-27T12:00:09.210Z", "dateReserved": "2023-09-26T13:09:58.802Z", "dateUpdated": "2024-09-23T19:26:52.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30990
Vulnerability from cvelistv5
Published
2022-05-18 19:38
Modified
2024-09-17 03:49
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2299 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2299" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "28037", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:38:04", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2299" } ], "source": { "advisory": "SEC-2299", "defect": [ "SEC-2299" ], "discovery": "INTERNAL" }, "title": "Sensitive information disclosure due to insecure folder permissions", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30990", "STATE": "PUBLIC", "TITLE": "Sensitive information disclosure due to insecure folder permissions" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "29240" } ] } }, { "product_name": "Acronis Agent", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "28037" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2299", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2299" } ] }, "source": { "advisory": "SEC-2299", "defect": [ "SEC-2299" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30990", "datePublished": "2022-05-18T19:38:04.964724Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-17T03:49:05.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48680
Vulnerability from cvelistv5
Published
2024-02-27 16:51
Modified
2024-09-10 15:47
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Cyber Protect 16 (macOS, Windows) before build 37391.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5392 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-48680", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-28T20:10:50.476113Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:27:40.644Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:54.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5392", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5392" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "macOS", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "37391", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Cyber Protect 16 (macOS, Windows) before build 37391." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T15:47:42.813Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5392", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5392" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-48680", "datePublished": "2024-02-27T16:51:19.284Z", "dateReserved": "2023-11-17T14:33:30.399Z", "dateUpdated": "2024-09-10T15:47:42.813Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41742
Vulnerability from cvelistv5
Published
2023-08-31 14:27
Modified
2024-09-27 14:17
Severity ?
EPSS score ?
Summary
Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-4351 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:47.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4351", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4351" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41742", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T13:05:43.523177Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T14:17:36.928Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30430", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1327", "description": "CWE-1327", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T14:27:28.948Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4351", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4351" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41742", "datePublished": "2023-08-31T14:27:28.948Z", "dateReserved": "2023-08-31T14:10:27.637Z", "dateUpdated": "2024-09-27T14:17:36.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45450
Vulnerability from cvelistv5
Published
2023-05-18 09:27
Modified
2025-01-22 16:18
Severity ?
EPSS score ?
Summary
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 28610, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 30984.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2410 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-2410", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2410" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45450", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T16:18:38.192533Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T16:18:42.210Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "28610", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 28610, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:27:38.534Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-2410", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2410" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45450", "datePublished": "2023-05-18T09:27:38.534Z", "dateReserved": "2022-11-16T16:45:58.650Z", "dateUpdated": "2025-01-22T16:18:42.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10138
Vulnerability from cvelistv5
Published
2020-10-21 13:40
Modified
2024-08-04 10:50
Severity ?
EPSS score ?
Summary
Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
References
▼ | URL | Tags |
---|---|---|
https://www.kb.cert.org/vuls/id/114757 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Cyber Backup |
Version: 12.5 < 16363 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/114757" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cyber Backup", "vendor": "Acronis", "versions": [ { "lessThan": "16363", "status": "affected", "version": "12.5", "versionType": "custom" } ] }, { "product": "Cyber Protect", "vendor": "Acronis", "versions": [ { "lessThan": "24600", "status": "affected", "version": "15", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Will Dormann" } ], "descriptions": [ { "lang": "en", "value": "Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\\jenkins_agent\\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-21T13:40:18", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.kb.cert.org/vuls/id/114757" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2020-10138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cyber Backup", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "12.5", "version_value": "16363" } ] } }, { "product_name": "Cyber Protect", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "15", "version_value": "24600" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "Will Dormann" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\\jenkins_agent\\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.kb.cert.org/vuls/id/114757", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/114757" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2020-10138", "datePublished": "2020-10-21T13:40:18", "dateReserved": "2020-03-05T00:00:00", "dateUpdated": "2024-08-04T10:50:57.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24113
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-16 19:57
Severity ?
EPSS score ?
Summary
Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2881 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:59:23.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "27147", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "39612", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis True Image 2021", "vendor": "Acronis", "versions": [ { "lessThan": "39287", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@penrose (https://hackerone.com/penrose)" } ], "datePublic": "2022-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "CWE-250", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-04T22:29:30", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2881" } ], "source": { "advisory": "SEC-2881", "defect": [ "SEC-2881" ], "discovery": "EXTERNAL" }, "title": "Local privilege escalation due to excessive permissions assigned to child processes", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2022-24113", "STATE": "PUBLIC", "TITLE": "Local privilege escalation due to excessive permissions assigned to child processes" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" } ] } }, { "product_name": "Acronis Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "27147" } ] } }, { "product_name": "Acronis Cyber Protect Home Office", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39612" } ] } }, { "product_name": "Acronis True Image 2021", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39287" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@penrose (https://hackerone.com/penrose)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-250" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2881", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2881" } ] }, "source": { "advisory": "SEC-2881", "defect": [ "SEC-2881" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-24113", "datePublished": "2022-02-04T22:29:30.215128Z", "dateReserved": "2022-01-28T00:00:00", "dateUpdated": "2024-09-16T19:57:01.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35556
Vulnerability from cvelistv5
Published
2021-02-22 02:17
Modified
2024-08-04 17:09
Severity ?
EPSS score ?
Summary
An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. Because the local notification service misconfigures CORS, information disclosure can occur.
References
▼ | URL | Tags |
---|---|---|
https://www.acronis.com | x_refsource_MISC | |
https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:09:13.375Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.acronis.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. Because the local notification service misconfigures CORS, information disclosure can occur." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-22T02:17:53", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.acronis.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. Because the local notification service misconfigures CORS, information disclosure can occur." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.acronis.com", "refsource": "MISC", "url": "https://www.acronis.com" }, { "name": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm", "refsource": "MISC", "url": "https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35556", "datePublished": "2021-02-22T02:17:53", "dateReserved": "2020-12-18T00:00:00", "dateUpdated": "2024-08-04T17:09:13.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-38087
Vulnerability from cvelistv5
Published
2021-08-12 13:44
Modified
2024-08-04 01:30
Severity ?
EPSS score ?
Summary
Reflected cross-site scripting (XSS) was possible on the login page in Acronis Cyber Protect 15 prior to build 27009.
References
▼ | URL | Tags |
---|---|---|
https://kb.acronis.com/content/68564 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:09.015Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.acronis.com/content/68564" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Reflected cross-site scripting (XSS) was possible on the login page in Acronis Cyber Protect 15 prior to build 27009." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-12T13:44:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.acronis.com/content/68564" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-38087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Reflected cross-site scripting (XSS) was possible on the login page in Acronis Cyber Protect 15 prior to build 27009." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.acronis.com/content/68564", "refsource": "MISC", "url": "https://kb.acronis.com/content/68564" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-38087", "datePublished": "2021-08-12T13:44:09", "dateReserved": "2021-08-03T00:00:00", "dateUpdated": "2024-08-04T01:30:09.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44201
Vulnerability from cvelistv5
Published
2021-11-29 18:18
Modified
2024-09-17 01:36
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3167 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3167" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@quadrant (https://hackerone.com/quadrant)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:18:51", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3167" } ], "source": { "advisory": "SEC-3167", "defect": [ "SEC-3167" ], "discovery": "EXTERNAL" }, "title": "Cross-site scripting (XSS) was possible in notification pop-ups", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44201", "STATE": "PUBLIC", "TITLE": "Cross-site scripting (XSS) was possible in notification pop-ups" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" }, { "platform": "Linux", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@quadrant (https://hackerone.com/quadrant)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-3167", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-3167" } ] }, "source": { "advisory": "SEC-3167", "defect": [ "SEC-3167" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44201", "datePublished": "2021-11-29T18:18:51.474533Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-17T01:36:52.438Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41749
Vulnerability from cvelistv5
Published
2023-08-31 20:17
Modified
2024-09-26 20:44
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5287 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:48.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5287", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5287" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41749", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T20:26:45.800270Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T20:44:01.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "32047", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T20:17:55.126Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5287", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5287" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41749", "datePublished": "2023-08-31T20:17:55.126Z", "dateReserved": "2023-08-31T14:10:27.638Z", "dateUpdated": "2024-09-26T20:44:01.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44200
Vulnerability from cvelistv5
Published
2021-11-29 18:19
Modified
2024-09-16 22:36
Severity ?
EPSS score ?
Summary
Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2803 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2803" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@mr-medi (https://hackerone.com/mr-medi)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:19:18", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2803" } ], "source": { "advisory": "SEC-2803", "defect": [ "SEC-2803" ], "discovery": "EXTERNAL" }, "title": "Self cross-site scripting (XSS) was possible on devices page", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44200", "STATE": "PUBLIC", "TITLE": "Self cross-site scripting (XSS) was possible on devices page" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" }, { "platform": "Linux", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@mr-medi (https://hackerone.com/mr-medi)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2803", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2803" } ] }, "source": { "advisory": "SEC-2803", "defect": [ "SEC-2803" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44200", "datePublished": "2021-11-29T18:19:18.256020Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-16T22:36:09.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44207
Vulnerability from cvelistv5
Published
2023-09-27 12:02
Modified
2024-09-23 20:08
Severity ?
EPSS score ?
Summary
Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5914 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5914", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5914" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44207", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:08:28.693097Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:08:36.611Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@und3sc0n0c1d0 (https://hackerone.com/und3sc0n0c1d0)" } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:02:27.141Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5914", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5914" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44207", "datePublished": "2023-09-27T12:02:27.141Z", "dateReserved": "2023-09-26T20:08:46.834Z", "dateUpdated": "2024-09-23T20:08:36.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48681
Vulnerability from cvelistv5
Published
2024-02-27 16:52
Modified
2024-08-02 21:37
Severity ?
EPSS score ?
Summary
Self cross-site scripting (XSS) vulnerability in storage nodes search field. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5900 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-48681", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-28T20:08:25.481937Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:27:38.225Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:54.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5900", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5900" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "37391", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@und3sc0n0c1d0 (https://hackerone.com/und3sc0n0c1d0)" } ], "descriptions": [ { "lang": "en", "value": "Self cross-site scripting (XSS) vulnerability in storage nodes search field. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391." } ], "metrics": [ { "cvssV3_0": { "baseScore": 1.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T17:06:59.743Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5900", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5900" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-48681", "datePublished": "2024-02-27T16:52:25.743Z", "dateReserved": "2023-11-17T14:33:30.400Z", "dateUpdated": "2024-08-02T21:37:54.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45451
Vulnerability from cvelistv5
Published
2023-08-31 14:43
Modified
2024-10-01 17:50
Severity ?
EPSS score ?
Summary
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-4858 | vendor-advisory | |
https://security-advisory.acronis.com/SEC-5487 | related |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect Home Office |
Version: unspecified ≤ |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:00.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4858", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4858" }, { "name": "SEC-5487", "tags": [ "related", "x_transferred" ], "url": "https://security-advisory.acronis.com/SEC-5487" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45451", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T17:50:00.443727Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T17:50:36.690Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "40173", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30600", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@alfarom256 (https://hackerone.com/alfarom256)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T14:43:49.464Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4858", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4858" }, { "name": "SEC-5487", "tags": [ "related" ], "url": "https://security-advisory.acronis.com/SEC-5487" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45451", "datePublished": "2023-08-31T14:43:49.464Z", "dateReserved": "2022-11-16T16:45:58.650Z", "dateUpdated": "2024-10-01T17:50:36.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48682
Vulnerability from cvelistv5
Published
2024-02-27 16:53
Modified
2024-08-02 21:37
Severity ?
EPSS score ?
Summary
Stored cross-site scripting (XSS) vulnerability in unit name. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5901 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-48682", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-27T19:15:52.663536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:22:02.235Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:54.485Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5901", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5901" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "37391", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@und3sc0n0c1d0 (https://hackerone.com/und3sc0n0c1d0)" } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) vulnerability in unit name. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T17:07:04.927Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5901", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5901" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-48682", "datePublished": "2024-02-27T16:53:05.091Z", "dateReserved": "2023-11-17T14:33:30.400Z", "dateUpdated": "2024-08-02T21:37:54.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48678
Vulnerability from cvelistv5
Published
2024-02-27 16:45
Modified
2024-08-16 19:22
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-2319 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:53.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-2319", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2319" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cyber_protect", "vendor": "acronis", "versions": [ { "lessThan": "37391", "status": "affected", "version": "16", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-48678", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-28T20:02:12.154898Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T19:22:09.595Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "37391", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T17:06:40.304Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-2319", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2319" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-48678", "datePublished": "2024-02-27T16:45:00.771Z", "dateReserved": "2023-11-17T14:33:30.399Z", "dateUpdated": "2024-08-16T19:22:09.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-38086
Vulnerability from cvelistv5
Published
2021-08-12 13:42
Modified
2024-08-04 01:30
Severity ?
EPSS score ?
Summary
Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking.
References
▼ | URL | Tags |
---|---|---|
https://kb.acronis.com/content/68564 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:09.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.acronis.com/content/68564" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-12T13:42:45", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.acronis.com/content/68564" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-38086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.acronis.com/content/68564", "refsource": "MISC", "url": "https://kb.acronis.com/content/68564" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-38086", "datePublished": "2021-08-12T13:42:45", "dateReserved": "2021-08-03T00:00:00", "dateUpdated": "2024-08-04T01:30:09.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45453
Vulnerability from cvelistv5
Published
2023-05-18 09:19
Modified
2025-01-22 14:45
Severity ?
EPSS score ?
Summary
TLS/SSL weak cipher suites enabled. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 30984.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-5112 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:00.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5112", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5112" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45453", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T14:45:46.288871Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T14:45:54.838Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "TLS/SSL weak cipher suites enabled. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-310", "description": "CWE-310", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:19:10.914Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5112", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5112" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45453", "datePublished": "2023-05-18T09:19:10.914Z", "dateReserved": "2022-11-16T16:45:58.650Z", "dateUpdated": "2025-01-22T14:45:54.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44202
Vulnerability from cvelistv5
Published
2021-11-29 18:19
Modified
2024-09-17 00:35
Severity ?
EPSS score ?
Summary
Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3283 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3283" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@emircuneyt_a (https://hackerone.com/emircuneyt_a)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:19:06", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3283" } ], "source": { "advisory": "SEC-3283", "defect": [ "SEC-3283" ], "discovery": "EXTERNAL" }, "title": "Stored cross-site scripting (XSS) was possible in activity details", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44202", "STATE": "PUBLIC", "TITLE": "Stored cross-site scripting (XSS) was possible in activity details" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" }, { "platform": "Linux", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@emircuneyt_a (https://hackerone.com/emircuneyt_a)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-3283", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-3283" } ] }, "source": { "advisory": "SEC-3283", "defect": [ "SEC-3283" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44202", "datePublished": "2021-11-29T18:19:06.652238Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-17T00:35:33.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-38088
Vulnerability from cvelistv5
Published
2021-08-12 13:38
Modified
2024-08-04 01:30
Severity ?
EPSS score ?
Summary
Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking.
References
▼ | URL | Tags |
---|---|---|
https://kb.acronis.com/content/68564 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:09.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.acronis.com/content/68564" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-12T13:38:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.acronis.com/content/68564" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-38088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.acronis.com/content/68564", "refsource": "MISC", "url": "https://kb.acronis.com/content/68564" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-38088", "datePublished": "2021-08-12T13:38:10", "dateReserved": "2021-08-03T00:00:00", "dateUpdated": "2024-08-04T01:30:09.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-49384
Vulnerability from cvelistv5
Published
2024-10-15 10:33
Modified
2024-10-15 12:47
Severity ?
EPSS score ?
Summary
Excessive attack surface in acep-collector service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-7284 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-49384", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T12:46:56.724045Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T12:47:14.120Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "38690", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Excessive attack surface in acep-collector service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1327", "description": "CWE-1327", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-15T10:33:52.655Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-7284", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-7284" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2024-49384", "datePublished": "2024-10-15T10:33:52.655Z", "dateReserved": "2024-10-14T15:01:16.473Z", "dateUpdated": "2024-10-15T12:47:14.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44158
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:07
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-4071 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.171Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4071", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4071" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44158", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:30.644678Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:07:34.572Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:01:12.850Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4071", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4071" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44158", "datePublished": "2023-09-27T12:01:12.850Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:07:34.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45454
Vulnerability from cvelistv5
Published
2023-02-13 09:25
Modified
2024-08-03 14:17
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30161, Acronis Cyber Protect 15 (Windows) before build 30984.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-4379 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: 0 ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.466Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4379", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4379" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30161", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@tkoyeung (https://hackerone.com/tkoyeung)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30161, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T09:25:26.680Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4379", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4379" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45454", "datePublished": "2023-02-13T09:25:26.680Z", "dateReserved": "2022-11-16T16:45:58.651Z", "dateUpdated": "2024-08-03T14:17:03.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-49383
Vulnerability from cvelistv5
Published
2024-10-15 10:33
Modified
2024-10-15 12:46
Severity ?
EPSS score ?
Summary
Excessive attack surface in acep-importer service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-7285 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-49383", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T12:46:37.448156Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T12:46:55.089Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "38690", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Excessive attack surface in acep-importer service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1327", "description": "CWE-1327", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-15T10:33:14.227Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-7285", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-7285" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2024-49383", "datePublished": "2024-10-15T10:33:14.227Z", "dateReserved": "2024-10-14T15:01:16.473Z", "dateUpdated": "2024-10-15T12:46:55.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44205
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:06
Severity ?
EPSS score ?
Summary
Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-4321 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4321", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4321" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44205", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:12.552255Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:06:49.914Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:01:46.915Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4321", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4321" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44205", "datePublished": "2023-09-27T12:01:46.915Z", "dateReserved": "2023-09-26T20:08:46.833Z", "dateUpdated": "2024-09-23T18:06:49.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45458
Vulnerability from cvelistv5
Published
2023-05-18 09:25
Modified
2025-01-22 14:43
Severity ?
EPSS score ?
Summary
Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 29633, Acronis Cyber Protect 15 (Windows, macOS, Linux) before build 30984.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-3952 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3952", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3952" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45458", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T14:42:58.378034Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T14:43:05.998Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "macOS", "Linux" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "29633", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "macOS", "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 29633, Acronis Cyber Protect 15 (Windows, macOS, Linux) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:25:04.232Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3952", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3952" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45458", "datePublished": "2023-05-18T09:25:04.232Z", "dateReserved": "2022-11-16T16:45:58.652Z", "dateUpdated": "2025-01-22T14:43:05.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-49387
Vulnerability from cvelistv5
Published
2024-10-15 10:34
Modified
2024-10-15 12:47
Severity ?
EPSS score ?
Summary
Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-7022 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 16 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-49387", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T12:47:15.696036Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T12:47:32.586Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 16", "vendor": "Acronis", "versions": [ { "lessThan": "38690", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-15T10:34:10.675Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-7022", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-7022" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2024-49387", "datePublished": "2024-10-15T10:34:10.675Z", "dateReserved": "2024-10-14T15:01:16.473Z", "dateUpdated": "2024-10-15T12:47:32.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45455
Vulnerability from cvelistv5
Published
2023-02-13 09:27
Modified
2024-08-03 14:17
Severity ?
EPSS score ?
Summary
Local privilege escalation due to incomplete uninstallation cleanup. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107, Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-4459 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect Home Office |
Version: unspecified ≤ |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:00.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4459", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4459" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "40107", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30025", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@tkoyeung (https://hackerone.com/tkoyeung)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to incomplete uninstallation cleanup. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107, Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T09:32:54.093Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4459", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4459" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45455", "datePublished": "2023-02-13T09:27:01.356Z", "dateReserved": "2022-11-16T16:45:58.651Z", "dateUpdated": "2024-08-03T14:17:00.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3405
Vulnerability from cvelistv5
Published
2023-05-03 10:49
Modified
2025-02-03 18:23
Severity ?
EPSS score ?
Summary
Code execution and sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4092", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4092" }, { "name": "Authentication Bypass with subsequent Remote Command Execution in Acronis Cyber Protect", "tags": [ "x_transferred" ], "url": "https://herolab.usd.de/security-advisories/usd-2022-0008/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-3405", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T18:23:29.274084Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-03T18:23:43.444Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29486", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Backup 12.5", "vendor": "Acronis", "versions": [ { "lessThan": "16545", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Sandro Tolksdorf of usd AG (https://herolab.usd.de)" }, { "lang": "en", "type": "finder", "value": "@boldglum (https://hackerone.com/boldglum)" } ], "descriptions": [ { "lang": "en", "value": "Code execution and sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.3, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-03T10:50:39.541Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4092", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4092" }, { "name": "Authentication Bypass with subsequent Remote Command Execution in Acronis Cyber Protect", "url": "https://herolab.usd.de/security-advisories/usd-2022-0008/" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-3405", "datePublished": "2023-05-03T10:49:47.642Z", "dateReserved": "2022-10-03T16:34:25.515Z", "dateUpdated": "2025-02-03T18:23:43.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41744
Vulnerability from cvelistv5
Published
2023-08-31 15:14
Modified
2024-10-01 17:25
Severity ?
EPSS score ?
Summary
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979.
References
▼ | URL | Tags |
---|---|---|
https://security-advisory.acronis.com/advisories/SEC-4728 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:47.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4728", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4728" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:acronis:agent:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "agent", "vendor": "acronis", "versions": [ { "lessThan": "30600", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "cyber_protect", "vendor": "acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41744", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T17:22:05.776787Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T17:25:21.815Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "macOS" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30600", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "macOS" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@vkas-afk (https://hackerone.com/vkas-afk)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T15:14:13.720Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4728", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4728" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41744", "datePublished": "2023-08-31T15:14:13.720Z", "dateReserved": "2023-08-31T14:10:27.638Z", "dateUpdated": "2024-10-01T17:25:21.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }