Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.
References
Link | Resource |
---|---|
https://security-advisory.acronis.com/advisories/SEC-3079 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
12 Sep 2024, 17:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
CPE | cpe:2.3:a:acronis:snap_deploy:*:*:*:*:*:windows:*:* cpe:2.3:a:acronis:snap_deploy:6:update1.2:*:*:*:windows:*:* cpe:2.3:a:acronis:snap_deploy:6:-:*:*:*:windows:*:* cpe:2.3:a:acronis:snap_deploy:6:update1:*:*:*:windows:*:* cpe:2.3:a:acronis:snap_deploy:6:update1.1:*:*:*:windows:*:* |
|
First Time |
Acronis snap Deploy
Acronis |
|
References | () https://security-advisory.acronis.com/advisories/SEC-3079 - Vendor Advisory |
30 Aug 2024, 13:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Aug 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-29 20:15
Updated : 2024-09-12 17:18
NVD link : CVE-2024-34019
Mitre link : CVE-2024-34019
CVE.ORG link : CVE-2024-34019
JSON object : View
Products Affected
acronis
- snap_deploy
CWE
CWE-427
Uncontrolled Search Path Element