Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cyber_protect
(Acronis)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 53 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-05-03 | CVE-2022-30995 | Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545. | Cyber_backup, Cyber_protect | 7.5 | ||
2023-02-13 | CVE-2022-45454 | Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30161, Acronis Cyber Protect 15 (Windows) before build 30984. | Agent, Cyber_protect | 7.5 | ||
2023-02-13 | CVE-2022-45455 | Local privilege escalation due to incomplete uninstallation cleanup. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107, Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984. | Agent, Cyber_protect, Cyber_protect_home_office | 7.8 | ||
2022-02-04 | CVE-2021-44204 | Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 | Agent, Cyber_protect, Cyber_protect_home_office, True_image | 7.8 | ||
2021-08-12 | CVE-2021-38088 | Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking. | Cyber_protect | 7.8 | ||
2022-05-18 | CVE-2022-30992 | Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240 | Cyber_protect | 6.1 | ||
2022-05-18 | CVE-2022-30993 | Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240 | Cyber_protect | 7.5 | ||
2022-05-18 | CVE-2022-30994 | Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240 | Cyber_protect | 7.5 | ||
2022-02-04 | CVE-2022-24113 | Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 | Agent, Cyber_protect, Cyber_protect_home_office, True_image | 7.8 | ||
2020-10-21 | CVE-2020-10138 | Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges. | Cyber_backup, Cyber_protect | 7.8 |