CVE-2023-41743 (GCVE-0-2023-41743)

Vulnerability from cvelistv5 – Published: 2023-08-31 15:04 – Updated: 2024-10-01 17:32
VLAI?
Summary
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.
CWE
Assigner
Impacted products
Vendor Product Version
Acronis Acronis Cyber Protect Home Office Affected: unspecified , < 40278 (semver)
Create a notification for this product.
    Acronis Acronis Agent Affected: unspecified , < 31637 (semver)
Create a notification for this product.
    Acronis Acronis Cyber Protect 15 Affected: unspecified , < 35979 (semver)
Create a notification for this product.
Credits
@alfarom256 (https://hackerone.com/alfarom256)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:09:47.982Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SEC-5487",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security-advisory.acronis.com/advisories/SEC-5487"
          },
          {
            "name": "SEC-4858",
            "tags": [
              "related",
              "x_transferred"
            ],
            "url": "https://security-advisory.acronis.com/SEC-4858"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "cyber_protect",
            "vendor": "acronis",
            "versions": [
              {
                "lessThan": "35979",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "cyber_protect_home_office",
            "vendor": "acronis",
            "versions": [
              {
                "lessThan": "40278",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:acronis:agent:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "agent",
            "vendor": "acronis",
            "versions": [
              {
                "lessThan": "31637",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41743",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-01T17:29:00.348301Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-01T17:32:05.640Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Acronis Cyber Protect Home Office",
          "vendor": "Acronis",
          "versions": [
            {
              "lessThan": "40278",
              "status": "affected",
              "version": "unspecified",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Acronis Agent",
          "vendor": "Acronis",
          "versions": [
            {
              "lessThan": "31637",
              "status": "affected",
              "version": "unspecified",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Acronis Cyber Protect 15",
          "vendor": "Acronis",
          "versions": [
            {
              "lessThan": "35979",
              "status": "affected",
              "version": "unspecified",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "@alfarom256 (https://hackerone.com/alfarom256)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-31T19:14:03.530Z",
        "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175",
        "shortName": "Acronis"
      },
      "references": [
        {
          "name": "SEC-5487",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security-advisory.acronis.com/advisories/SEC-5487"
        },
        {
          "name": "SEC-4858",
          "tags": [
            "related"
          ],
          "url": "https://security-advisory.acronis.com/SEC-4858"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175",
    "assignerShortName": "Acronis",
    "cveId": "CVE-2023-41743",
    "datePublished": "2023-08-31T15:04:10.802Z",
    "dateReserved": "2023-08-31T14:10:27.638Z",
    "dateUpdated": "2024-10-01T17:32:05.640Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"c23.02\", \"matchCriteriaId\": \"6F4ABAEF-E87F-40CF-B8DA-5E70F9A480B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"89899D10-1343-4276-919A-9C1DF2DB8B55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A77B2499-B3A4-4278-BA0D-59AB59C60352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAF6A576-C320-4550-B7F8-4FCAE82FB06A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9740A956-D589-4846-8717-B6182EB65F8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*\", \"matchCriteriaId\": \"69506F27-DEF8-4317-9E54-D79CA430AD4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8418AF63-E280-4CE2-8E5C-DCD00ABE6557\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect_home_office:39900:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0894339-A1AD-4382-A4B0-C13FEDE1F076\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect_home_office:40107:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DE560C6-2EC0-4C58-AA31-B15512F45877\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect_home_office:40173:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E47F65B4-ACD6-4507-9242-35530163A730\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect_home_office:40208:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE9F5E36-F752-4C7C-A678-D5B596A71C67\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.\"}, {\"lang\": \"es\", \"value\": \"Escalada de privilegios locales debido a permisos inseguros del puerto de comunicaci\\u00f3n del conductor. Los siguientes productos se ven afectados: Acronis Cyber ??Protect Home Office (Windows) antes de la compilaci\\u00f3n 40278, Acronis Agent (Windows) antes de la compilaci\\u00f3n 31637, Acronis Cyber ??Protect 15 (Windows) antes de la compilaci\\u00f3n 35979.\"}]",
      "id": "CVE-2023-41743",
      "lastModified": "2024-11-21T08:21:36.350",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"security@acronis.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 6.0}]}",
      "published": "2023-08-31T16:15:10.270",
      "references": "[{\"url\": \"https://security-advisory.acronis.com/SEC-4858\", \"source\": \"security@acronis.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://security-advisory.acronis.com/advisories/SEC-5487\", \"source\": \"security@acronis.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://security-advisory.acronis.com/SEC-4858\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://security-advisory.acronis.com/advisories/SEC-5487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@acronis.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security@acronis.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-41743\",\"sourceIdentifier\":\"security@acronis.com\",\"published\":\"2023-08-31T16:15:10.270\",\"lastModified\":\"2024-11-21T08:21:36.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.\"},{\"lang\":\"es\",\"value\":\"Escalada de privilegios locales debido a permisos inseguros del puerto de comunicaci\u00f3n del conductor. Los siguientes productos se ven afectados: Acronis Cyber ??Protect Home Office (Windows) antes de la compilaci\u00f3n 40278, Acronis Agent (Windows) antes de la compilaci\u00f3n 31637, Acronis Cyber ??Protect 15 (Windows) antes de la compilaci\u00f3n 35979.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@acronis.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security@acronis.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"c23.02\",\"matchCriteriaId\":\"6F4ABAEF-E87F-40CF-B8DA-5E70F9A480B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"89899D10-1343-4276-919A-9C1DF2DB8B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A77B2499-B3A4-4278-BA0D-59AB59C60352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF6A576-C320-4550-B7F8-4FCAE82FB06A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9740A956-D589-4846-8717-B6182EB65F8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"69506F27-DEF8-4317-9E54-D79CA430AD4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8418AF63-E280-4CE2-8E5C-DCD00ABE6557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect_home_office:39900:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0894339-A1AD-4382-A4B0-C13FEDE1F076\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect_home_office:40107:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DE560C6-2EC0-4C58-AA31-B15512F45877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect_home_office:40173:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E47F65B4-ACD6-4507-9242-35530163A730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect_home_office:40208:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE9F5E36-F752-4C7C-A678-D5B596A71C67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://security-advisory.acronis.com/SEC-4858\",\"source\":\"security@acronis.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security-advisory.acronis.com/advisories/SEC-5487\",\"source\":\"security@acronis.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security-advisory.acronis.com/SEC-4858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security-advisory.acronis.com/advisories/SEC-5487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security-advisory.acronis.com/advisories/SEC-5487\", \"name\": \"SEC-5487\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://security-advisory.acronis.com/SEC-4858\", \"name\": \"SEC-4858\", \"tags\": [\"related\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T19:09:47.982Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-41743\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-01T17:29:00.348301Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*\"], \"vendor\": \"acronis\", \"product\": \"cyber_protect\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"35979\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*\"], \"vendor\": \"acronis\", \"product\": \"cyber_protect_home_office\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"40278\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:acronis:agent:-:*:*:*:*:*:*:*\"], \"vendor\": \"acronis\", \"product\": \"agent\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"31637\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-01T17:31:41.175Z\"}}], \"cna\": {\"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"@alfarom256 (https://hackerone.com/alfarom256)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Acronis\", \"product\": \"Acronis Cyber Protect Home Office\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"40278\", \"versionType\": \"semver\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Acronis\", \"product\": \"Acronis Agent\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"31637\", \"versionType\": \"semver\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Acronis\", \"product\": \"Acronis Cyber Protect 15\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"35979\", \"versionType\": \"semver\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://security-advisory.acronis.com/advisories/SEC-5487\", \"name\": \"SEC-5487\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://security-advisory.acronis.com/SEC-4858\", \"name\": \"SEC-4858\", \"tags\": [\"related\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269\"}]}], \"providerMetadata\": {\"orgId\": \"73dc0fef-1c66-4a72-9d2d-0a0f4012c175\", \"shortName\": \"Acronis\", \"dateUpdated\": \"2023-08-31T19:14:03.530Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-41743\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-01T17:32:05.640Z\", \"dateReserved\": \"2023-08-31T14:10:27.638Z\", \"assignerOrgId\": \"73dc0fef-1c66-4a72-9d2d-0a0f4012c175\", \"datePublished\": \"2023-08-31T15:04:10.802Z\", \"assignerShortName\": \"Acronis\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…