Products
Acronis Snap Deploy
- before build 4569
Source
security@acronis.com
Tags
CVE-2024-34017 details
Published : Aug. 29, 2024, 8:15 p.m.
Last Modified : Aug. 29, 2024, 8:15 p.m.
Last Modified : Aug. 29, 2024, 8:15 p.m.
Description
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.7 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-427 | Uncontrolled Search Path Element | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
CVSS Data
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
6.7
Exploitability Score
0.8
Impact Score
5.9
Base Severity
MEDIUM
Vector String : CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://security-advisory.acronis.com/advisories/SEC-4505 | security@acronis.com |
This website uses the NVD API, but is not approved or certified by it.