Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-10057 |
|
Mon, 20 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:acronis:true_image:*:*:*:*:*:windows:*:* |
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Privilege Escalation via DLL Hijacking in Acronis True Image | |
| First Time appeared |
Acronis
Acronis true Image |
|
| Vendors & Products |
Acronis
Acronis true Image |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42902. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2026-04-03T03:55:47.929Z
Reserved: 2026-04-01T00:44:58.734Z
Link: CVE-2026-27774
Updated: 2026-04-02T17:46:33.413Z
Status : Analyzed
Published: 2026-04-02T18:16:26.930
Modified: 2026-04-20T16:38:20.907
Link: CVE-2026-27774
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:18:17Z