ID | CVSS | Summary | Last (major) update | Published | |
CVE-2020-14999 | 5.0 |
A logic bug in system monitoring driver of Acronis Agent after 12.5.21540 and before 12.5.23094 allowed to bypass Windows memory protection and access sensitive data.
|
05-08-2021 - 19:10 | 30-07-2021 - 14:15 | |
CVE-2021-34800 | 5.0 |
Sensitive information could be logged. The following products are affected: Acronis Agent (Windows, Linux, macOS) before build 27147
|
30-11-2021 - 15:56 | 29-11-2021 - 20:15 | |
CVE-2021-44199 | 1.9 |
DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612
|
30-11-2021 - 21:23 | 29-11-2021 - 19:15 | |
CVE-2021-44204 | 4.6 |
Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office
|
09-08-2022 - 00:39 | 04-02-2022 - 23:15 | |
CVE-2022-24113 | 4.6 |
Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Of
|
11-02-2022 - 03:13 | 04-02-2022 - 23:15 | |
CVE-2022-30990 | 5.0 |
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037
|
01-06-2022 - 17:25 | 18-05-2022 - 20:15 |