Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://security-advisory.acronis.com/advisories/SEC-10401 |
|
Mon, 20 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:acronis:true_image:*:*:*:*:*:windows:*:* |
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acronis
Acronis true Image |
|
| Vendors & Products |
Acronis
Acronis true Image |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42902. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: Acronis
Published:
Updated: 2026-04-03T03:55:46.690Z
Reserved: 2026-03-03T02:29:03.755Z
Link: CVE-2026-28728
Updated: 2026-04-02T17:45:52.347Z
Status : Analyzed
Published: 2026-04-02T18:16:27.260
Modified: 2026-04-20T16:38:24.203
Link: CVE-2026-28728
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:18:18Z