Update

CyberProtectHomeOffice

CyberProtectHomeOffice

to version 28.3.1.41126

View all applications

CVE Vulnerabilities for CyberProtectHomeOffice

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2023‑50422023‑09‑20 12:15:12HIGH (8)Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.44NETWORK
CVE‑2023‑486772023‑12‑12 09:15:08HIGH (8)Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901, Acronis Cyber Protect Cloud Agent (Windows) before build 39378.26LOCAL
CVE‑2023‑442082023‑10‑04 12:15:11CRITICAL (9)Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.45NETWORK
CVE‑2023‑417432023‑08‑31 16:15:10HIGH (8)Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.26LOCAL
CVE‑2022‑468692023‑08‑31 20:15:08HIGH (8)Local privilege escalation during installation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278.26LOCAL
CVE‑2022‑468682023‑08‑31 15:15:08HIGH (8)Local privilege escalation during recovery due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173.26LOCAL
CVE‑2022‑454552023‑02‑13 10:15:15HIGH (8)Local privilege escalation due to incomplete uninstallation cleanup. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107, Acronis Agent (Windows) before build 30025, Acronis Cyber Protect 15 (Windows) before build 30984.26LOCAL
CVE‑2022‑454512023‑08‑31 15:15:08HIGH (8)Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.26LOCAL
CVE‑2022‑447472022‑11‑07 20:15:10HIGH (8)Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.26LOCAL
CVE‑2022‑447462022‑11‑07 20:15:10MEDIUM (6)Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.24LOCAL
CVE‑2022‑447452022‑11‑07 20:15:10MEDIUM (6)Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.24LOCAL
CVE‑2022‑447442022‑11‑07 20:15:10HIGH (7)Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.16LOCAL
CVE‑2022‑447332022‑11‑07 19:15:10HIGH (8)Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900.26LOCAL
CVE‑2022‑447322022‑11‑07 19:15:10HIGH (8)Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900.26LOCAL
CVE‑2022‑44182023‑05‑18 10:15:10HIGH (8)Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40208.26LOCAL
CVE‑2022‑241152022‑02‑04 23:15:16HIGH (8)Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 3928726LOCAL
CVE‑2022‑241142022‑02‑04 23:15:16HIGH (7)Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 3928716LOCAL
CVE‑2022‑241132022‑02‑04 23:15:16HIGH (8)Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 3928726LOCAL
CVE‑2021‑442062022‑02‑04 23:15:12HIGH (7)Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 3928716LOCAL
CVE‑2021‑442052022‑02‑04 23:15:12HIGH (7)Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 3928716LOCAL
CVE‑2021‑442042022‑02‑04 23:15:12HIGH (8)Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 3928726LOCAL
CVE‑2021‑441992021‑11‑29 19:15:08MEDIUM (6)DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 3961224LOCAL

View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.