Page 3 of 58 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 13EXPL: 0

31 Aug 2023 — Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979. Escalada de privilegios locales debido a permisos inseguros del puerto de comunicación del conductor. Los siguientes productos se ven afectados: Acronis Cyber ??Protect Home Office (Windows) antes de la compilación 40278, Acronis ... • https://security-advisory.acronis.com/SEC-4858 • CWE-269: Improper Privilege Management •

CVSS: 8.8EPSS: 0%CPEs: 8EXPL: 1

31 Aug 2023 — Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984. • https://github.com/alfarom256/CVE-2022-45451 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

31 Aug 2023 — Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. • https://security-advisory.acronis.com/advisories/SEC-4351 • CWE-668: Exposure of Resource to Wrong Sphere CWE-1327: Binding to an Unrestricted IP Address •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

07 Jun 2023 — A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree. A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the Sys... • https://kcm.trellix.com/corporate/index?page=content&id=SB10398 • CWE-427: Uncontrolled Search Path Element •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

07 Jun 2023 — A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable. • https://kcm.trellix.com/corporate/index?page=content&id=SB10398 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

18 May 2023 — Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 28610, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 30984. • https://security-advisory.acronis.com/advisories/SEC-2410 • CWE-285: Improper Authorization CWE-552: Files or Directories Accessible to External Parties •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

18 May 2023 — Sensitive information disclosure due to insecure registry permissions. The following products are affected: Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984. • https://security-advisory.acronis.com/advisories/SEC-3196 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-276: Incorrect Default Permissions •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

18 May 2023 — Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 29633, Acronis Cyber Protect 15 (Windows, macOS, Linux) before build 30984. • https://security-advisory.acronis.com/advisories/SEC-3952 • CWE-295: Improper Certificate Validation •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

18 May 2023 — Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows) before build 29633, Acronis Cyber Protect 15 (Windows) before build 30984. • https://security-advisory.acronis.com/advisories/SEC-3957 • CWE-295: Improper Certificate Validation •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

18 May 2023 — Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Agent (Windows) before build 30430, Acronis Cyber Protect 15 (Windows) before build 30984. • https://security-advisory.acronis.com/advisories/SEC-3967 • CWE-269: Improper Privilege Management CWE-276: Incorrect Default Permissions •