Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-43413 | Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24. |
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-5129 |
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 18 Oct 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acronis
Acronis cyber Files |
|
| CPEs | cpe:2.3:a:acronis:cyber_files:*:*:*:*:*:windows:*:* | |
| Vendors & Products |
Acronis
Acronis cyber Files |
|
| Metrics |
cvssV3_1
|
Thu, 17 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 17 Oct 2024 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24. | |
| Weaknesses | CWE-359 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2024-10-17T15:51:09.093Z
Reserved: 2024-10-14T15:01:16.473Z
Link: CVE-2024-49386
Updated: 2024-10-17T15:51:03.583Z
Status : Analyzed
Published: 2024-10-17T10:15:03.547
Modified: 2024-10-18T20:11:05.120
Link: CVE-2024-49386
No data.
OpenCVE Enrichment
No data.
EUVD