CVE-2020-9450
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe exposes a REST API that can be used by everyone, even unprivileged users. This API is used to communicate from the GUI to anti_ransomware_service.exe. This can be exploited to add an arbitrary malicious executable to the whitelist, or even exclude an entire drive from being monitored by anti_ransomware_service.exe.
Se detectó un problema en Acronis True Image 2020 versiones 24.5.22510. El archivo anti_ransomware_service.exe expone una API REST que puede ser utilizada por todos, inclusive por usuarios no privilegiados. Esta API es usada para comunicarse desde la GUI hacia el archivo anti_ransomware_service.exe. Esto puede ser explotado para agregar un ejecutable malicioso arbitrario a la lista blanca, o inclusive excluir una unidad completa de ser monitoreada por el archivo anti_ransomware_service.exe
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-02-28 CVE Reserved
- 2021-05-25 CVE Published
- 2023-08-17 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-276: Incorrect Default Permissions
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://danishcyberdefence.dk/blog | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://madsjoensen.dk/cve-2020-9450 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.acronis.com | 2021-05-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Acronis Search vendor "Acronis" | True Image 2020 Search vendor "Acronis" for product "True Image 2020" | 24.5.22510 Search vendor "Acronis" for product "True Image 2020" and version "24.5.22510" | - |
Affected
|