Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52794 | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. |
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-2245 |
|
Thu, 02 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Jan 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2025-01-02T17:09:38.773Z
Reserved: 2024-12-06T17:33:33.992Z
Link: CVE-2024-55540
Updated: 2025-01-02T17:09:35.616Z
Status : Received
Published: 2025-01-02T16:15:07.847
Modified: 2025-01-02T16:15:07.847
Link: CVE-2024-55540
No data.
OpenCVE Enrichment
No data.
EUVD