CVE-2023-41743
https://notcve.org/view.php?id=CVE-2023-41743
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979. Escalada de privilegios locales debido a permisos inseguros del puerto de comunicación del conductor. Los siguientes productos se ven afectados: Acronis Cyber ??Protect Home Office (Windows) antes de la compilación 40278, Acronis Agent (Windows) antes de la compilación 31637, Acronis Cyber ?? • https://security-advisory.acronis.com/SEC-4858 https://security-advisory.acronis.com/advisories/SEC-5487 • CWE-269: Improper Privilege Management •
CVE-2022-45451
https://notcve.org/view.php?id=CVE-2022-45451
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984. • https://github.com/alfarom256/CVE-2022-45451 https://security-advisory.acronis.com/SEC-5487 https://security-advisory.acronis.com/advisories/SEC-4858 • CWE-269: Improper Privilege Management •
CVE-2023-41742
https://notcve.org/view.php?id=CVE-2023-41742
Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. • https://security-advisory.acronis.com/advisories/SEC-4351 • CWE-668: Exposure of Resource to Wrong Sphere CWE-1327: Binding to an Unrestricted IP Address •
CVE-2023-0976
https://notcve.org/view.php?id=CVE-2023-0976
A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree. • https://kcm.trellix.com/corporate/index?page=content&id=SB10398 • CWE-427: Uncontrolled Search Path Element •
CVE-2023-1388
https://notcve.org/view.php?id=CVE-2023-1388
A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable. • https://kcm.trellix.com/corporate/index?page=content&id=SB10398 • CWE-787: Out-of-bounds Write •