Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34589 | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569. |
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-4505 |
|
Thu, 12 Sep 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:acronis:snap_deploy:6:-:*:*:*:windows:*:* |
Thu, 12 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:acronis:snap_deploy:6:update1.1:*:*:*:windows:*:* cpe:2.3:a:acronis:snap_deploy:6:update1.2:*:*:*:windows:*:* cpe:2.3:a:acronis:snap_deploy:6:update1:*:*:*:windows:*:* |
|
| Metrics |
cvssV3_1
|
Thu, 29 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acronis
Acronis snap Deploy |
|
| CPEs | cpe:2.3:a:acronis:snap_deploy:*:*:*:*:*:windows:*:* | |
| Vendors & Products |
Acronis
Acronis snap Deploy |
|
| Metrics |
ssvc
|
Thu, 29 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2024-08-29T19:38:52.936Z
Reserved: 2024-04-29T15:33:32.846Z
Link: CVE-2024-34017
Updated: 2024-08-29T19:38:45.785Z
Status : Analyzed
Published: 2024-08-29T20:15:07.743
Modified: 2024-09-12T17:16:09.890
Link: CVE-2024-34017
No data.
OpenCVE Enrichment
No data.
EUVD