Page 28 of 151 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API. • https://danishcyberdefence.dk/blog https://madsjoensen.dk/cve-2020-9452 https://www.acronis.com • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe exposes a REST API that can be used by everyone, even unprivileged users. This API is used to communicate from the GUI to anti_ransomware_service.exe. This can be exploited to add an arbitrary malicious executable to the whitelist, or even exclude an entire drive from being monitored by anti_ransomware_service.exe. Se detectó un problema en Acronis True Image 2020 versiones 24.5.22510. El archivo anti_ransomware_service.exe expone una API REST que puede ser utilizada por todos, inclusive por usuarios no privilegiados. • https://danishcyberdefence.dk/blog https://madsjoensen.dk/cve-2020-9450 https://www.acronis.com • CWE-276: Incorrect Default Permissions •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot. Se detectó un problema en Acronis True Image 2020 versiones 24.5.22510. • https://danishcyberdefence.dk/blog https://madsjoensen.dk/cve-2020-9451 https://www.acronis.com • CWE-276: Incorrect Default Permissions •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. Because the local notification service misconfigures CORS, information disclosure can occur. Se detectó un problema en Acronis Cyber ??Protect versiones anteriores a 15 Update 1 build 26172. Debido a que el servicio de notificación local configura inapropiadamente CORS, puede ocurrir una divulgación de información • https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm https://www.acronis.com •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Acronis Cyber Protect before 15 Update 1 build 26172. There is cross-site scripting (XSS) in the console. Se detectó un problema en Acronis Cyber ??Protect versiones anteriores a 15 Update 1 build 26172. Se presenta una vulnerabilidad de tipo cross-site scripting (XSS) en la consola • https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm https://www.acronis.com • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •