Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-43417 | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24. |
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-5845 |
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 18 Oct 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:acronis:cyber_files:*:*:*:*:*:windows:*:* | |
| Metrics |
cvssV3_1
|
Thu, 17 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acronis
Acronis cyber Files |
|
| CPEs | cpe:2.3:a:acronis:cyber_files:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Acronis
Acronis cyber Files |
|
| Metrics |
ssvc
|
Thu, 17 Oct 2024 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2024-10-17T14:37:50.922Z
Reserved: 2024-10-14T15:41:14.350Z
Link: CVE-2024-49390
Updated: 2024-10-17T14:37:43.297Z
Status : Analyzed
Published: 2024-10-17T10:15:04.017
Modified: 2024-10-18T20:11:32.270
Link: CVE-2024-49390
No data.
OpenCVE Enrichment
No data.
EUVD