
CVE-2023-41750
https://notcve.org/view.php?id=CVE-2023-41750
31 Aug 2023 — Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 32047. Divulgación de información sensible por falta de autorización. Los siguientes productos se ven afectados: Acronis Agent (Linux, macOS, Windows) anterior a la compilación 32047. • https://security-advisory.acronis.com/advisories/SEC-5382 • CWE-862: Missing Authorization •

CVE-2023-41749
https://notcve.org/view.php?id=CVE-2023-41749
31 Aug 2023 — Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979. Divulgación de información sensible debido a la recopilación excesiva de información del sistema. Los siguientes productos se ven afectados: Acronis Agent (Windows) antes de la compilación 32047, Acronis Cyber ??Protect 15 (Windows) antes de la compilación 35979. • https://security-advisory.acronis.com/advisories/SEC-5287 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2022-46869
https://notcve.org/view.php?id=CVE-2022-46869
31 Aug 2023 — Local privilege escalation during installation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278. Escalada de privilegios locales debido a un manejo inadecuado de enlaces blandos durante la instalación. Los siguientes productos se ven afectados: Acronis Cyber ??Protect Home Office (Windows) anterior a la compilación 40278 • https://security-advisory.acronis.com/advisories/SEC-3835 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-269: Improper Privilege Management CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVE-2023-41748
https://notcve.org/view.php?id=CVE-2023-41748
31 Aug 2023 — Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203. • https://security-advisory.acronis.com/advisories/SEC-5816 • CWE-20: Improper Input Validation •

CVE-2023-41747
https://notcve.org/view.php?id=CVE-2023-41747
31 Aug 2023 — Sensitive information disclosure due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203. Sensitive information disclosure due to unauthenticated path traversal. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203. • https://security-advisory.acronis.com/advisories/SEC-5811 • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-41746
https://notcve.org/view.php?id=CVE-2023-41746
31 Aug 2023 — Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203. • https://security-advisory.acronis.com/advisories/SEC-5810 • CWE-20: Improper Input Validation •

CVE-2023-41745
https://notcve.org/view.php?id=CVE-2023-41745
31 Aug 2023 — Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. • https://security-advisory.acronis.com/advisories/SEC-2008 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2023-34391 – Insecure Inherited Permissions
https://notcve.org/view.php?id=CVE-2023-34391
31 Aug 2023 — Insecure Inherited Permissions vulnerability in Schweitzer Engineering Laboratories SEL-5033 AcSELerator RTAC Software on Windows allows Leveraging/Manipulating Configuration File Search Paths. See Instruction Manual Appendix A [Cybersecurity] tag dated 20230522 for more details. This issue affects SEL-5033 AcSELerator RTAC Software: before 1.35.151.21000. • https://dragos.com • CWE-277: Insecure Inherited Permissions CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-31173 – Use of Hard-coded Credentials
https://notcve.org/view.php?id=CVE-2023-31173
31 Aug 2023 — Use of Hard-coded Credentials vulnerability in Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator on Windows allows Authentication Bypass. See Instruction Manual Appendix A and Appendix E dated 20230615 for more details. This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20. • https://selinc.com/support/security-notifications/external-reports • CWE-798: Use of Hard-coded Credentials •

CVE-2023-31167 – Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
https://notcve.org/view.php?id=CVE-2023-31167
31 Aug 2023 — Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Schweitzer Engineering Laboratories SEL-5036 acSELerator Bay Screen Builder Software on Windows allows Relative Path Traversal. SEL acSELerator Bay Screen Builder software is distributed by SEL-5033 SEL acSELerator RTAC, SEL-5030 Quickset, and SEL Compass. CVE-2023-31167 and was patched in the acSELerator Bay Screen Builder release available on 20230602. Please contact SEL for additional details. This issue affec... • https://dragos.com • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •