Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52797 | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. |
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-6418 |
|
Thu, 02 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Jan 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2025-01-02T17:10:10.488Z
Reserved: 2024-12-06T17:33:33.992Z
Link: CVE-2024-55543
Updated: 2025-01-02T17:10:06.342Z
Status : Received
Published: 2025-01-02T16:15:08.237
Modified: 2025-01-02T16:15:08.237
Link: CVE-2024-55543
No data.
OpenCVE Enrichment
No data.
EUVD