Vulnerabilites related to Acronis - Acronis Cyber Protect 15
CVE-2022-45450 (GCVE-0-2022-45450)
Vulnerability from cvelistv5
Published
2023-05-18 09:27
Modified
2025-01-22 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 28610, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 30984.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-2410", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2410" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45450", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T16:18:38.192533Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T16:18:42.210Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "28610", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 28610, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:27:38.534Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-2410", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2410" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45450", "datePublished": "2023-05-18T09:27:38.534Z", "dateReserved": "2022-11-16T16:45:58.650Z", "dateUpdated": "2025-01-22T16:18:42.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44161 (GCVE-0-2023-44161)
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4084", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4084" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44161", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:21.883180Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:07:11.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@laz0rde (https://hackerone.com/laz0rde)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4084", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4084" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44161", "datePublished": "2023-09-27T12:01:35.358Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:07:11.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44158 (GCVE-0-2023-44158)
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.171Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4071", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4071" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44158", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:30.644678Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:07:34.572Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:01:12.850Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4071", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4071" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44158", "datePublished": "2023-09-27T12:01:12.850Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:07:34.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44160 (GCVE-0-2023-44160)
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-08-02 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-44160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T13:28:36.994222Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T20:32:04.510Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4083", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4083" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@laz0rde (https://hackerone.com/laz0rde)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4083", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4083" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44160", "datePublished": "2023-09-27T12:01:23.677Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-08-02T19:59:50.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45453 (GCVE-0-2022-45453)
Vulnerability from cvelistv5
Published
2023-05-18 09:19
Modified
2025-01-22 14:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
TLS/SSL weak cipher suites enabled. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 30984.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:00.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5112", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5112" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45453", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T14:45:46.288871Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T14:45:54.838Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "TLS/SSL weak cipher suites enabled. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-310", "description": "CWE-310", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:19:10.914Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5112", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5112" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45453", "datePublished": "2023-05-18T09:19:10.914Z", "dateReserved": "2022-11-16T16:45:58.650Z", "dateUpdated": "2025-01-22T14:45:54.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44200 (GCVE-0-2021-44200)
Vulnerability from cvelistv5
Published
2021-11-29 18:19
Modified
2024-09-16 22:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2803" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@mr-medi (https://hackerone.com/mr-medi)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:19:18", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2803" } ], "source": { "advisory": "SEC-2803", "defect": [ "SEC-2803" ], "discovery": "EXTERNAL" }, "title": "Self cross-site scripting (XSS) was possible on devices page", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44200", "STATE": "PUBLIC", "TITLE": "Self cross-site scripting (XSS) was possible on devices page" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" }, { "platform": "Linux", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@mr-medi (https://hackerone.com/mr-medi)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2803", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2803" } ] }, "source": { "advisory": "SEC-2803", "defect": [ "SEC-2803" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44200", "datePublished": "2021-11-29T18:19:18.256020Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-16T22:36:09.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-41743 (GCVE-0-2023-41743)
Vulnerability from cvelistv5
Published
2023-08-31 15:04
Modified
2024-10-01 17:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect Home Office |
Version: unspecified ≤ |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:47.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5487", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5487" }, { "name": "SEC-4858", "tags": [ "related", "x_transferred" ], "url": "https://security-advisory.acronis.com/SEC-4858" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "cyber_protect", "vendor": "acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "cyber_protect_home_office", "vendor": "acronis", "versions": [ { "lessThan": "40278", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:acronis:agent:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "agent", "vendor": "acronis", "versions": [ { "lessThan": "31637", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41743", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T17:29:00.348301Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T17:32:05.640Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "40278", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "31637", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@alfarom256 (https://hackerone.com/alfarom256)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T19:14:03.530Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5487", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5487" }, { "name": "SEC-4858", "tags": [ "related" ], "url": "https://security-advisory.acronis.com/SEC-4858" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41743", "datePublished": "2023-08-31T15:04:10.802Z", "dateReserved": "2023-08-31T14:10:27.638Z", "dateUpdated": "2024-10-01T17:32:05.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-41745 (GCVE-0-2023-41745)
Vulnerability from cvelistv5
Published
2023-08-31 17:16
Modified
2024-09-27 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:47.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-2008", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2008" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41745", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T13:05:14.356631Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T14:16:25.438Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30991", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T17:16:56.516Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-2008", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2008" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41745", "datePublished": "2023-08-31T17:16:56.516Z", "dateReserved": "2023-08-31T14:10:27.638Z", "dateUpdated": "2024-09-27T14:16:25.438Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30993 (GCVE-0-2022-30993)
Vulnerability from cvelistv5
Published
2022-05-18 19:42
Modified
2024-09-17 04:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2441" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:42:02", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2441" } ], "source": { "advisory": "SEC-2441", "defect": [ "SEC-2441" ], "discovery": "INTERNAL" }, "title": "Cleartext transmission of sensitive information", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30993", "STATE": "PUBLIC", "TITLE": "Cleartext transmission of sensitive information" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "29240" }, { "platform": "Windows", "version_affected": "\u003c", "version_value": "29240" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2441", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2441" } ] }, "source": { "advisory": "SEC-2441", "defect": [ "SEC-2441" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30993", "datePublished": "2022-05-18T19:42:02.470306Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-17T04:20:12.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44154 (GCVE-0-2023-44154)
Vulnerability from cvelistv5
Published
2023-09-27 12:00
Modified
2024-09-23 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.234Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-2436", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2436" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44154", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T19:26:05.033286Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T19:26:20.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-28T08:12:49.829Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-2436", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2436" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44154", "datePublished": "2023-09-27T12:00:34.428Z", "dateReserved": "2023-09-26T13:09:58.802Z", "dateUpdated": "2024-09-23T19:26:20.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-3405 (GCVE-0-2022-3405)
Vulnerability from cvelistv5
Published
2023-05-03 10:49
Modified
2025-02-03 18:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Code execution and sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4092", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4092" }, { "name": "Authentication Bypass with subsequent Remote Command Execution in Acronis Cyber Protect", "tags": [ "x_transferred" ], "url": "https://herolab.usd.de/security-advisories/usd-2022-0008/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-3405", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T18:23:29.274084Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-03T18:23:43.444Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29486", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Backup 12.5", "vendor": "Acronis", "versions": [ { "lessThan": "16545", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Sandro Tolksdorf of usd AG (https://herolab.usd.de)" }, { "lang": "en", "type": "finder", "value": "@boldglum (https://hackerone.com/boldglum)" } ], "descriptions": [ { "lang": "en", "value": "Code execution and sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.3, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-03T10:50:39.541Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4092", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4092" }, { "name": "Authentication Bypass with subsequent Remote Command Execution in Acronis Cyber Protect", "url": "https://herolab.usd.de/security-advisories/usd-2022-0008/" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-3405", "datePublished": "2023-05-03T10:49:47.642Z", "dateReserved": "2022-10-03T16:34:25.515Z", "dateUpdated": "2025-02-03T18:23:43.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45457 (GCVE-0-2022-45457)
Vulnerability from cvelistv5
Published
2023-05-18 09:23
Modified
2025-01-22 14:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows) before build 29633, Acronis Cyber Protect 15 (Windows) before build 30984.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.533Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3957", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3957" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45457", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T14:43:35.259080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T14:43:42.077Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "29633", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows) before build 29633, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:23:51.453Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3957", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3957" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45457", "datePublished": "2023-05-18T09:23:51.453Z", "dateReserved": "2022-11-16T16:45:58.652Z", "dateUpdated": "2025-01-22T14:43:42.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44202 (GCVE-0-2021-44202)
Vulnerability from cvelistv5
Published
2021-11-29 18:19
Modified
2024-09-17 00:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3283" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@emircuneyt_a (https://hackerone.com/emircuneyt_a)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:19:06", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3283" } ], "source": { "advisory": "SEC-3283", "defect": [ "SEC-3283" ], "discovery": "EXTERNAL" }, "title": "Stored cross-site scripting (XSS) was possible in activity details", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44202", "STATE": "PUBLIC", "TITLE": "Stored cross-site scripting (XSS) was possible in activity details" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" }, { "platform": "Linux", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@emircuneyt_a (https://hackerone.com/emircuneyt_a)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-3283", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-3283" } ] }, "source": { "advisory": "SEC-3283", "defect": [ "SEC-3283" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44202", "datePublished": "2021-11-29T18:19:06.652238Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-17T00:35:33.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45452 (GCVE-0-2022-45452)
Vulnerability from cvelistv5
Published
2023-05-18 09:21
Modified
2025-01-22 14:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30430, Acronis Cyber Protect 15 (Windows) before build 30984.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:00.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3967", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3967" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45452", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T14:44:16.653287Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T14:44:25.933Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30430", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@netero1010 (https://hackerone.com/netero1010)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30430, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:21:55.932Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3967", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3967" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45452", "datePublished": "2023-05-18T09:21:55.932Z", "dateReserved": "2022-11-16T16:45:58.650Z", "dateUpdated": "2025-01-22T14:44:25.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30995 (GCVE-0-2022-30995)
Vulnerability from cvelistv5
Published
2023-05-03 10:50
Modified
2025-01-30 15:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3855", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3855" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-30995", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-30T15:19:22.624037Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-30T15:19:32.564Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29486", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Backup 12.5", "vendor": "Acronis", "versions": [ { "lessThan": "16545", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@boldglum (https://hackerone.com/boldglum)" }, { "lang": "en", "type": "finder", "value": "Sandro Tolksdorf of usd AG (https://herolab.usd.de)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.3, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-03T10:50:45.883Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3855", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3855" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30995", "datePublished": "2023-05-03T10:50:45.883Z", "dateReserved": "2022-05-18T07:09:14.532Z", "dateUpdated": "2025-01-30T15:19:32.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44201 (GCVE-0-2021-44201)
Vulnerability from cvelistv5
Published
2021-11-29 18:18
Modified
2024-09-17 01:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3167" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@quadrant (https://hackerone.com/quadrant)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:18:51", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3167" } ], "source": { "advisory": "SEC-3167", "defect": [ "SEC-3167" ], "discovery": "EXTERNAL" }, "title": "Cross-site scripting (XSS) was possible in notification pop-ups", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44201", "STATE": "PUBLIC", "TITLE": "Cross-site scripting (XSS) was possible in notification pop-ups" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" }, { "platform": "Linux", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@quadrant (https://hackerone.com/quadrant)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-3167", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-3167" } ] }, "source": { "advisory": "SEC-3167", "defect": [ "SEC-3167" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44201", "datePublished": "2021-11-29T18:18:51.474533Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-17T01:36:52.438Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44204 (GCVE-0-2021-44204)
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-17 01:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2355" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "27147", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "39612", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis True Image 2021", "vendor": "Acronis", "versions": [ { "lessThan": "39287", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@xnand (https://hackerone.com/xnand)" } ], "datePublic": "2022-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-04T22:29:33", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2355" } ], "source": { "advisory": "SEC-2355", "defect": [ "SEC-2355" ], "discovery": "EXTERNAL" }, "title": "Local privilege escalation via named pipe due to improper access control checks", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2021-44204", "STATE": "PUBLIC", "TITLE": "Local privilege escalation via named pipe due to improper access control checks" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" } ] } }, { "product_name": "Acronis Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "27147" } ] } }, { "product_name": "Acronis Cyber Protect Home Office", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39612" } ] } }, { "product_name": "Acronis True Image 2021", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39287" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@xnand (https://hackerone.com/xnand)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2355", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2355" } ] }, "source": { "advisory": "SEC-2355", "defect": [ "SEC-2355" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44204", "datePublished": "2022-02-04T22:29:33.071413Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-17T01:12:21.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30994 (GCVE-0-2022-30994)
Vulnerability from cvelistv5
Published
2022-05-18 19:41
Modified
2024-09-17 02:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2388" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:41:32", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2388" } ], "source": { "advisory": "SEC-2388", "defect": [ "SEC-2388" ], "discovery": "INTERNAL" }, "title": "Cleartext transmission of sensitive information", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30994", "STATE": "PUBLIC", "TITLE": "Cleartext transmission of sensitive information" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "29240" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2388", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2388" } ] }, "source": { "advisory": "SEC-2388", "defect": [ "SEC-2388" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30994", "datePublished": "2022-05-18T19:41:32.839531Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-17T02:06:03.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44155 (GCVE-0-2023-44155)
Vulnerability from cvelistv5
Published
2023-09-27 12:00
Modified
2024-09-23 18:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3471", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3471" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44155", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:48.572538Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:11:04.492Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:00:50.339Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3471", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3471" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44155", "datePublished": "2023-09-27T12:00:50.339Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:11:04.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30991 (GCVE-0-2022-30991)
Vulnerability from cvelistv5
Published
2022-05-18 19:43
Modified
2024-09-17 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3928" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@netero1010 (https://hackerone.com/netero1010)" } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:43:14", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3928" } ], "source": { "advisory": "SEC-3928", "defect": [ "SEC-3928" ], "discovery": "EXTERNAL" }, "title": "HTML injection via report name", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30991", "STATE": "PUBLIC", "TITLE": "HTML injection via report name" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "29240" }, { "platform": "Windows", "version_affected": "\u003c", "version_value": "29240" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@netero1010 (https://hackerone.com/netero1010)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-3928", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-3928" } ] }, "source": { "advisory": "SEC-3928", "defect": [ "SEC-3928" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30991", "datePublished": "2022-05-18T19:43:14.157456Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-17T01:46:35.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44156 (GCVE-0-2023-44156)
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5124", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5124" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44156", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:06.746293Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:06:33.949Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T15:48:36.646Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5124", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5124" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44156", "datePublished": "2023-09-27T12:01:56.823Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:06:33.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44205 (GCVE-0-2023-44205)
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4321", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4321" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44205", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:12.552255Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:06:49.914Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:01:46.915Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4321", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4321" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44205", "datePublished": "2023-09-27T12:01:46.915Z", "dateReserved": "2023-09-26T20:08:46.833Z", "dateUpdated": "2024-09-23T18:06:49.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44203 (GCVE-0-2021-44203)
Vulnerability from cvelistv5
Published
2021-11-29 18:19
Modified
2024-09-16 22:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@frankiexote (https://hackerone.com/frankiexote)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:19:01", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3294" } ], "source": { "advisory": "SEC-3294", "defect": [ "SEC-3294" ], "discovery": "EXTERNAL" }, "title": "Stored cross-site scripting (XSS) was possible in protection plan details", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44203", "STATE": "PUBLIC", "TITLE": "Stored cross-site scripting (XSS) was possible in protection plan details" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" }, { "platform": "Linux", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@frankiexote (https://hackerone.com/frankiexote)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-3294", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-3294" } ] }, "source": { "advisory": "SEC-3294", "defect": [ "SEC-3294" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44203", "datePublished": "2021-11-29T18:19:01.156130Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-16T22:45:05.734Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45451 (GCVE-0-2022-45451)
Vulnerability from cvelistv5
Published
2023-08-31 14:43
Modified
2024-10-01 17:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect Home Office |
Version: unspecified ≤ |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:00.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4858", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4858" }, { "name": "SEC-5487", "tags": [ "related", "x_transferred" ], "url": "https://security-advisory.acronis.com/SEC-5487" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45451", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T17:50:00.443727Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T17:50:36.690Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "40173", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30600", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@alfarom256 (https://hackerone.com/alfarom256)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T14:43:49.464Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4858", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4858" }, { "name": "SEC-5487", "tags": [ "related" ], "url": "https://security-advisory.acronis.com/SEC-5487" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45451", "datePublished": "2023-08-31T14:43:49.464Z", "dateReserved": "2022-11-16T16:45:58.650Z", "dateUpdated": "2024-10-01T17:50:36.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45454 (GCVE-0-2022-45454)
Vulnerability from cvelistv5
Published
2023-02-13 09:25
Modified
2025-03-21 14:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30161, Acronis Cyber Protect 15 (Windows) before build 30984.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: 0 ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.466Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4379", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4379" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45454", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-21T14:48:45.555125Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-21T14:48:53.018Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30161", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@tkoyeung (https://hackerone.com/tkoyeung)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30161, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T09:25:26.680Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4379", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4379" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45454", "datePublished": "2023-02-13T09:25:26.680Z", "dateReserved": "2022-11-16T16:45:58.651Z", "dateUpdated": "2025-03-21T14:48:53.018Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45455 (GCVE-0-2022-45455)
Vulnerability from cvelistv5
Published
2023-02-13 09:27
Modified
2025-03-21 14:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Local privilege escalation due to incomplete uninstallation cleanup. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107, Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect Home Office |
Version: unspecified ≤ |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:00.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4459", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4459" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45455", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-21T14:48:18.814295Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-21T14:48:25.891Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "40107", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30025", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@tkoyeung (https://hackerone.com/tkoyeung)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to incomplete uninstallation cleanup. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107, Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T09:32:54.093Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4459", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4459" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45455", "datePublished": "2023-02-13T09:27:01.356Z", "dateReserved": "2022-11-16T16:45:58.651Z", "dateUpdated": "2025-03-21T14:48:25.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44157 (GCVE-0-2023-44157)
Vulnerability from cvelistv5
Published
2023-09-27 12:01
Modified
2024-09-23 18:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3956", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3956" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44157", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:39.391223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:08:04.787Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:01:02.383Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3956", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3956" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44157", "datePublished": "2023-09-27T12:01:02.383Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:08:04.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-41744 (GCVE-0-2023-41744)
Vulnerability from cvelistv5
Published
2023-08-31 15:14
Modified
2024-10-01 17:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:47.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4728", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4728" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:acronis:agent:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "agent", "vendor": "acronis", "versions": [ { "lessThan": "30600", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "cyber_protect", "vendor": "acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41744", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T17:22:05.776787Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T17:25:21.815Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "macOS" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30600", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "macOS" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@vkas-afk (https://hackerone.com/vkas-afk)" } ], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T15:14:13.720Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4728", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4728" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41744", "datePublished": "2023-08-31T15:14:13.720Z", "dateReserved": "2023-08-31T14:10:27.638Z", "dateUpdated": "2024-10-01T17:25:21.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44153 (GCVE-0-2023-44153)
Vulnerability from cvelistv5
Published
2023-09-27 12:00
Modified
2024-09-23 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-1994", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1994" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44153", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T19:26:40.511726Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T19:26:52.210Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-316", "description": "CWE-316", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:00:09.210Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-1994", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1994" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44153", "datePublished": "2023-09-27T12:00:09.210Z", "dateReserved": "2023-09-26T13:09:58.802Z", "dateUpdated": "2024-09-23T19:26:52.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-41749 (GCVE-0-2023-41749)
Vulnerability from cvelistv5
Published
2023-08-31 20:17
Modified
2024-09-26 20:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:48.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5287", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5287" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41749", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T20:26:45.800270Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T20:44:01.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "32047", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T20:17:55.126Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5287", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5287" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41749", "datePublished": "2023-08-31T20:17:55.126Z", "dateReserved": "2023-08-31T14:10:27.638Z", "dateUpdated": "2024-09-26T20:44:01.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24113 (GCVE-0-2022-24113)
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-16 19:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:59:23.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "27147", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "39612", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis True Image 2021", "vendor": "Acronis", "versions": [ { "lessThan": "39287", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@penrose (https://hackerone.com/penrose)" } ], "datePublic": "2022-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "CWE-250", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-04T22:29:30", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2881" } ], "source": { "advisory": "SEC-2881", "defect": [ "SEC-2881" ], "discovery": "EXTERNAL" }, "title": "Local privilege escalation due to excessive permissions assigned to child processes", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-02-02T00:00:00.000Z", "ID": "CVE-2022-24113", "STATE": "PUBLIC", "TITLE": "Local privilege escalation due to excessive permissions assigned to child processes" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" } ] } }, { "product_name": "Acronis Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "27147" } ] } }, { "product_name": "Acronis Cyber Protect Home Office", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39612" } ] } }, { "product_name": "Acronis True Image 2021", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39287" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@penrose (https://hackerone.com/penrose)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-250" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2881", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2881" } ] }, "source": { "advisory": "SEC-2881", "defect": [ "SEC-2881" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-24113", "datePublished": "2022-02-04T22:29:30.215128Z", "dateReserved": "2022-01-28T00:00:00", "dateUpdated": "2024-09-16T19:57:01.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44207 (GCVE-0-2023-44207)
Vulnerability from cvelistv5
Published
2023-09-27 12:02
Modified
2024-09-23 20:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5914", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5914" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44207", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:08:28.693097Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:08:36.611Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@und3sc0n0c1d0 (https://hackerone.com/und3sc0n0c1d0)" } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:02:27.141Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5914", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5914" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44207", "datePublished": "2023-09-27T12:02:27.141Z", "dateReserved": "2023-09-26T20:08:46.834Z", "dateUpdated": "2024-09-23T20:08:36.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30990 (GCVE-0-2022-30990)
Vulnerability from cvelistv5
Published
2022-05-18 19:38
Modified
2024-09-17 03:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2299" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "28037", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:38:04", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2299" } ], "source": { "advisory": "SEC-2299", "defect": [ "SEC-2299" ], "discovery": "INTERNAL" }, "title": "Sensitive information disclosure due to insecure folder permissions", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30990", "STATE": "PUBLIC", "TITLE": "Sensitive information disclosure due to insecure folder permissions" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "29240" } ] } }, { "product_name": "Acronis Agent", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "28037" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2299", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2299" } ] }, "source": { "advisory": "SEC-2299", "defect": [ "SEC-2299" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30990", "datePublished": "2022-05-18T19:38:04.964724Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-17T03:49:05.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44198 (GCVE-0-2021-44198)
Vulnerability from cvelistv5
Published
2021-11-29 18:18
Modified
2024-09-16 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "@vanitas (https://hackerone.com/vanitas)" }, { "lang": "en", "value": "@vasebur (https://hackerone.com/vasebur)" }, { "lang": "en", "value": "@mmg (https://hackerone.com/mmg)" } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:18:56", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2128" } ], "source": { "advisory": "SEC-2128", "defect": [ "SEC-2128" ], "discovery": "EXTERNAL" }, "title": "DLL hijacking could lead to local privilege escalation", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44198", "STATE": "PUBLIC", "TITLE": "DLL hijacking could lead to local privilege escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [ { "lang": "eng", "value": "@vanitas (https://hackerone.com/vanitas)" }, { "lang": "eng", "value": "@vasebur (https://hackerone.com/vasebur)" }, { "lang": "eng", "value": "@mmg (https://hackerone.com/mmg)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2128", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2128" } ] }, "source": { "advisory": "SEC-2128", "defect": [ "SEC-2128" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44198", "datePublished": "2021-11-29T18:18:56.612364Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-16T20:27:10.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-41742 (GCVE-0-2023-41742)
Vulnerability from cvelistv5
Published
2023-08-31 14:27
Modified
2024-09-27 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:47.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-4351", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4351" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41742", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T13:05:43.523177Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T14:17:36.928Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30430", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1327", "description": "CWE-1327", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T14:27:28.948Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-4351", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-4351" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-41742", "datePublished": "2023-08-31T14:27:28.948Z", "dateReserved": "2023-08-31T14:10:27.637Z", "dateUpdated": "2024-09-27T14:17:36.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45449 (GCVE-0-2022-45449)
Vulnerability from cvelistv5
Published
2024-07-16 14:47
Modified
2024-08-03 14:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 30984.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-45449", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T16:22:45.744171Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T16:22:53.735Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:00.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5279", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5279" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to excessive privileges assigned to Acronis Agent. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-16T14:47:21.100Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5279", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5279" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45449", "datePublished": "2024-07-16T14:47:21.100Z", "dateReserved": "2022-11-16T16:45:58.650Z", "dateUpdated": "2024-08-03T14:17:00.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45459 (GCVE-0-2022-45459)
Vulnerability from cvelistv5
Published
2023-05-18 09:26
Modified
2025-01-22 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to insecure registry permissions. The following products are affected: Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3196", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3196" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45459", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T16:18:54.800223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T16:18:57.514Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "30025", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to insecure registry permissions. The following products are affected: Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:26:22.045Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3196", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3196" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45459", "datePublished": "2023-05-18T09:26:22.045Z", "dateReserved": "2022-11-16T16:45:58.652Z", "dateUpdated": "2025-01-22T16:18:57.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44206 (GCVE-0-2023-44206)
Vulnerability from cvelistv5
Published
2023-09-27 12:02
Modified
2024-09-23 20:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5839", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5839" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:acronis:cyber_protect:15:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cyber_protect", "vendor": "acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "15", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-44206", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:12:08.740528Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:13:38.682Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "@theelgo64 (https://hackerone.com/theelgo64)" } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:02:16.923Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5839", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5839" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44206", "datePublished": "2023-09-27T12:02:16.923Z", "dateReserved": "2023-09-26T20:08:46.834Z", "dateUpdated": "2024-09-23T20:13:38.682Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45458 (GCVE-0-2022-45458)
Vulnerability from cvelistv5
Published
2023-05-18 09:25
Modified
2025-01-22 14:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 29633, Acronis Cyber Protect 15 (Windows, macOS, Linux) before build 30984.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Agent |
Version: unspecified ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:03.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-3952", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3952" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45458", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-22T14:42:58.378034Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-22T14:43:05.998Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "macOS", "Linux" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "29633", "status": "affected", "version": "unspecified", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "macOS", "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "30984", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 29633, Acronis Cyber Protect 15 (Windows, macOS, Linux) before build 30984." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-18T09:25:04.232Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-3952", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-3952" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-45458", "datePublished": "2023-05-18T09:25:04.232Z", "dateReserved": "2022-11-16T16:45:58.652Z", "dateUpdated": "2025-01-22T14:43:05.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30992 (GCVE-0-2022-30992)
Vulnerability from cvelistv5
Published
2022-05-18 19:42
Modified
2024-09-16 19:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 29240 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.102Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2917" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "29240", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T19:42:45", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2917" } ], "source": { "advisory": "SEC-2917", "defect": [ "SEC-2917" ], "discovery": "INTERNAL" }, "title": "Open redirect via user-controlled query parameter", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2022-05-18T00:00:00.000Z", "ID": "CVE-2022-30992", "STATE": "PUBLIC", "TITLE": "Open redirect via user-controlled query parameter" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_value": "29240" }, { "platform": "Windows", "version_affected": "\u003c", "version_value": "29240" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2917", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2917" } ] }, "source": { "advisory": "SEC-2917", "defect": [ "SEC-2917" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2022-30992", "datePublished": "2022-05-18T19:42:45.904385Z", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-09-16T19:10:09.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44159 (GCVE-0-2023-44159)
Vulnerability from cvelistv5
Published
2023-09-27 12:02
Modified
2024-09-23 18:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.005Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-5787", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5787" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44159", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:30:58.152838Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:06:19.272Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T12:02:06.679Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-5787", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-5787" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44159", "datePublished": "2023-09-27T12:02:06.679Z", "dateReserved": "2023-09-26T13:09:58.803Z", "dateUpdated": "2024-09-23T18:06:19.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44199 (GCVE-0-2021-44199)
Vulnerability from cvelistv5
Published
2021-11-29 18:19
Modified
2024-09-16 22:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Acronis | Acronis Cyber Protect 15 |
Version: unspecified < 28035 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.842Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2508" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "28035", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Agent", "vendor": "Acronis", "versions": [ { "lessThan": "27305", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows" ], "product": "Acronis Cyber Protect Home Office", "vendor": "Acronis", "versions": [ { "lessThan": "39612", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T18:19:12", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-advisory.acronis.com/advisories/SEC-2508" } ], "source": { "advisory": "SEC-2508", "defect": [ "SEC-2508" ], "discovery": "INTERNAL" }, "title": "DLL hijacking could lead to denial of service", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@acronis.com", "DATE_PUBLIC": "2021-11-25T00:00:00.000Z", "ID": "CVE-2021-44199", "STATE": "PUBLIC", "TITLE": "DLL hijacking could lead to denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Acronis Cyber Protect 15", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "28035" } ] } }, { "product_name": "Acronis Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "27305" } ] } }, { "product_name": "Acronis Cyber Protect Home Office", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_value": "39612" } ] } } ] }, "vendor_name": "Acronis" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-advisory.acronis.com/advisories/SEC-2508", "refsource": "MISC", "url": "https://security-advisory.acronis.com/advisories/SEC-2508" } ] }, "source": { "advisory": "SEC-2508", "defect": [ "SEC-2508" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2021-44199", "datePublished": "2021-11-29T18:19:12.590356Z", "dateReserved": "2021-11-24T00:00:00", "dateUpdated": "2024-09-16T22:20:30.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-44152 (GCVE-0-2023-44152)
Vulnerability from cvelistv5
Published
2023-09-27 11:59
Modified
2024-09-23 18:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Acronis | Acronis Cyber Protect 15 |
Version: unspecified ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SEC-1908", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1908" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44152", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:31:58.785593Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T18:11:17.766Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "macOS", "Windows" ], "product": "Acronis Cyber Protect 15", "vendor": "Acronis", "versions": [ { "lessThan": "35979", "status": "affected", "version": "unspecified", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T15:48:49.986Z", "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "shortName": "Acronis" }, "references": [ { "name": "SEC-1908", "tags": [ "vendor-advisory" ], "url": "https://security-advisory.acronis.com/advisories/SEC-1908" } ] } }, "cveMetadata": { "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175", "assignerShortName": "Acronis", "cveId": "CVE-2023-44152", "datePublished": "2023-09-27T11:59:56.524Z", "dateReserved": "2023-09-26T13:09:58.802Z", "dateUpdated": "2024-09-23T18:11:17.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }