CVE-2020-15496
https://notcve.org/view.php?id=CVE-2020-15496
Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions. Acronis True Image for Mac versiones anteriores a 2021 Update 4, permitía una escalada de privilegios local debido a permisos no seguros de las carpetas • https://kb.acronis.com/content/68396 https://www.acronis.com/en-us/support/updates/index.html • CWE-281: Improper Preservation of Permissions •
CVE-2020-25736 – Acronis TrueImage XPC Privilege Escalation
https://notcve.org/view.php?id=CVE-2020-25736
Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration. Acronis True Image versiones 2019 update 1 hasta 2021 update 1 en macOS, permite una escalada de privilegios local debido a una configuración no segura del servicio XPC • http://packetstormsecurity.com/files/170246/Acronis-TrueImage-XPC-Privilege-Escalation.html https://kb.acronis.com/content/68061 https://www.acronis.com/en-us/blog •
CVE-2020-9452
https://notcve.org/view.php?id=CVE-2020-9452
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API. • https://danishcyberdefence.dk/blog https://madsjoensen.dk/cve-2020-9452 https://www.acronis.com • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2020-9450
https://notcve.org/view.php?id=CVE-2020-9450
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe exposes a REST API that can be used by everyone, even unprivileged users. This API is used to communicate from the GUI to anti_ransomware_service.exe. This can be exploited to add an arbitrary malicious executable to the whitelist, or even exclude an entire drive from being monitored by anti_ransomware_service.exe. Se detectó un problema en Acronis True Image 2020 versiones 24.5.22510. El archivo anti_ransomware_service.exe expone una API REST que puede ser utilizada por todos, inclusive por usuarios no privilegiados. • https://danishcyberdefence.dk/blog https://madsjoensen.dk/cve-2020-9450 https://www.acronis.com • CWE-276: Incorrect Default Permissions •
CVE-2020-9451
https://notcve.org/view.php?id=CVE-2020-9451
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot. Se detectó un problema en Acronis True Image 2020 versiones 24.5.22510. • https://danishcyberdefence.dk/blog https://madsjoensen.dk/cve-2020-9451 https://www.acronis.com • CWE-276: Incorrect Default Permissions •