Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-2330 |
|
Fri, 17 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Privilege Escalation via DLL Hijacking in Acronis Cyber Protect 17 |
Wed, 11 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acronis cyber Protect
Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Acronis cyber Protect
Microsoft Microsoft windows |
Fri, 06 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acronis
Acronis acronis Cyber Protect 17 |
|
| Vendors & Products |
Acronis
Acronis acronis Cyber Protect 17 |
Fri, 06 Mar 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2026-03-07T04:55:19.021Z
Reserved: 2026-03-03T02:29:03.753Z
Link: CVE-2026-28711
Updated: 2026-03-06T19:31:20.866Z
Status : Analyzed
Published: 2026-03-06T00:16:11.450
Modified: 2026-03-11T14:01:54.483
Link: CVE-2026-28711
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:45:16Z