CVE-2024-55541
https://notcve.org/view.php?id=CVE-2024-55541
02 Jan 2025 — Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39169. • https://security-advisory.acronis.com/advisories/SEC-3647 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-55542
https://notcve.org/view.php?id=CVE-2024-55542
02 Jan 2025 — Local privilege escalation due to excessive permissions assigned to Tray Monitor service. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35895. • https://security-advisory.acronis.com/advisories/SEC-5342 • CWE-266: Incorrect Privilege Assignment •
CVE-2024-56414
https://notcve.org/view.php?id=CVE-2024-56414
02 Jan 2025 — Web installer integrity check used weak hash algorithm. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. • https://security-advisory.acronis.com/advisories/SEC-1911 • CWE-328: Use of Weak Hash •
CVE-2024-56413
https://notcve.org/view.php?id=CVE-2024-56413
02 Jan 2025 — Missing session invalidation after user deletion. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. • https://security-advisory.acronis.com/advisories/SEC-7612 • CWE-613: Insufficient Session Expiration •
CVE-2024-55540
https://notcve.org/view.php?id=CVE-2024-55540
02 Jan 2025 — Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. • https://security-advisory.acronis.com/advisories/SEC-2245 • CWE-427: Uncontrolled Search Path Element •
CVE-2024-55543
https://notcve.org/view.php?id=CVE-2024-55543
02 Jan 2025 — Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. • https://security-advisory.acronis.com/advisories/SEC-6418 • CWE-427: Uncontrolled Search Path Element •
CVE-2024-49388
https://notcve.org/view.php?id=CVE-2024-49388
15 Oct 2024 — Sensitive information manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690. Manipulación de información confidencial debido a una autorización indebida. Los siguientes productos están afectados: Acronis Cyber Protect 16 (Linux, Windows) anterior a la compilación 38690. • https://security-advisory.acronis.com/advisories/SEC-5984 • CWE-639: Authorization Bypass Through User-Controlled Key •
CVE-2024-49387
https://notcve.org/view.php?id=CVE-2024-49387
15 Oct 2024 — Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690. Transmisión de texto plano de información confidencial en el servicio acep-collector. Los siguientes productos están afectados: Acronis Cyber Protect 16 (Linux, Windows) anterior a la compilación 38690. • https://security-advisory.acronis.com/advisories/SEC-7022 • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2024-49384
https://notcve.org/view.php?id=CVE-2024-49384
15 Oct 2024 — Excessive attack surface in acep-collector service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690. Superficie de ataque excesiva en el servicio acep-collector debido a la vinculación a una dirección IP sin restricciones. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (Linux, Windows) antes de la compilación 38690. • https://security-advisory.acronis.com/advisories/SEC-7284 • CWE-1327: Binding to an Unrestricted IP Address •
CVE-2024-49383
https://notcve.org/view.php?id=CVE-2024-49383
15 Oct 2024 — Excessive attack surface in acep-importer service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690. Superficie de ataque excesiva en el servicio acep-importer debido a la vinculación a una dirección IP sin restricciones. Los siguientes productos se ven afectados: Acronis Cyber Protect 16 (Linux, Windows) antes de la compilación 38690. • https://security-advisory.acronis.com/advisories/SEC-7285 • CWE-1327: Binding to an Unrestricted IP Address •