Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-2332 |
|
Thu, 16 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | DLL Hijacking Enables Local Privilege Escalation in Acronis Cyber Protect 17 |
Wed, 11 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acronis cyber Protect
Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Acronis cyber Protect
Microsoft Microsoft windows |
Fri, 06 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acronis
Acronis acronis Cyber Protect 17 |
|
| Vendors & Products |
Acronis
Acronis acronis Cyber Protect 17 |
Fri, 06 Mar 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2026-03-07T04:55:17.528Z
Reserved: 2026-03-03T02:29:03.753Z
Link: CVE-2026-28712
Updated: 2026-03-06T19:31:18.748Z
Status : Analyzed
Published: 2026-03-06T00:16:11.593
Modified: 2026-03-11T14:00:40.600
Link: CVE-2026-28712
No data.
OpenCVE Enrichment
Updated: 2026-04-16T12:00:11Z