CVE-2021-44204 (GCVE-0-2021-44204)
Vulnerability from cvelistv5 – Published: 2022-02-04 22:29 – Updated: 2024-09-17 01:12
VLAI?
Title
Local privilege escalation via named pipe due to improper access control checks
Summary
Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Acronis | Acronis Cyber Protect 15 |
Affected:
unspecified , < 28035
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
@xnand (https://hackerone.com/xnand)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T04:17:24.863Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security-advisory.acronis.com/advisories/SEC-2355"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"Windows"
],
"product": "Acronis Cyber Protect 15",
"vendor": "Acronis",
"versions": [
{
"lessThan": "28035",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"Windows"
],
"product": "Acronis Agent",
"vendor": "Acronis",
"versions": [
{
"lessThan": "27147",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"Windows"
],
"product": "Acronis Cyber Protect Home Office",
"vendor": "Acronis",
"versions": [
{
"lessThan": "39612",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"platforms": [
"Windows"
],
"product": "Acronis True Image 2021",
"vendor": "Acronis",
"versions": [
{
"lessThan": "39287",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "@xnand (https://hackerone.com/xnand)"
}
],
"datePublic": "2022-02-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-04T22:29:33",
"orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175",
"shortName": "Acronis"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security-advisory.acronis.com/advisories/SEC-2355"
}
],
"source": {
"advisory": "SEC-2355",
"defect": [
"SEC-2355"
],
"discovery": "EXTERNAL"
},
"title": "Local privilege escalation via named pipe due to improper access control checks",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@acronis.com",
"DATE_PUBLIC": "2022-02-02T00:00:00.000Z",
"ID": "CVE-2021-44204",
"STATE": "PUBLIC",
"TITLE": "Local privilege escalation via named pipe due to improper access control checks"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Acronis Cyber Protect 15",
"version": {
"version_data": [
{
"platform": "Windows",
"version_affected": "\u003c",
"version_value": "28035"
}
]
}
},
{
"product_name": "Acronis Agent",
"version": {
"version_data": [
{
"platform": "Windows",
"version_affected": "\u003c",
"version_value": "27147"
}
]
}
},
{
"product_name": "Acronis Cyber Protect Home Office",
"version": {
"version_data": [
{
"platform": "Windows",
"version_affected": "\u003c",
"version_value": "39612"
}
]
}
},
{
"product_name": "Acronis True Image 2021",
"version": {
"version_data": [
{
"platform": "Windows",
"version_affected": "\u003c",
"version_value": "39287"
}
]
}
}
]
},
"vendor_name": "Acronis"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "@xnand (https://hackerone.com/xnand)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security-advisory.acronis.com/advisories/SEC-2355",
"refsource": "MISC",
"url": "https://security-advisory.acronis.com/advisories/SEC-2355"
}
]
},
"source": {
"advisory": "SEC-2355",
"defect": [
"SEC-2355"
],
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175",
"assignerShortName": "Acronis",
"cveId": "CVE-2021-44204",
"datePublished": "2022-02-04T22:29:33.071413Z",
"dateReserved": "2021-11-24T00:00:00",
"dateUpdated": "2024-09-17T01:12:21.982Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:true_image:2021:*:*:*:*:-:*:*\", \"matchCriteriaId\": \"7DC81A5D-044A-44EF-8695-748A63778291\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:windows:*:*\", \"matchCriteriaId\": \"B1CFEB0F-588B-4B88-9169-4ADB6396C1C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:true_image:2021:update_2:*:*:*:windows:*:*\", \"matchCriteriaId\": \"54BE6067-0357-4C68-AA06-CB5EEA3DD86F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:windows:*:*\", \"matchCriteriaId\": \"02D1EBBC-47EE-4C46-AA69-DD0B7DE1B173\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:true_image:2021:update_4:*:*:*:windows:*:*\", \"matchCriteriaId\": \"0CF1A7BF-9B93-4D7C-BCD8-30DEF789B46B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:true_image:2021:update_5:*:*:*:windows:*:*\", \"matchCriteriaId\": \"B55B6ED7-C602-4C7B-88C5-B0499D61EB1E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"c21.06\", \"matchCriteriaId\": \"85D71339-7F19-41DC-B6D2-BF776F472EE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"89899D10-1343-4276-919A-9C1DF2DB8B55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A77B2499-B3A4-4278-BA0D-59AB59C60352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAF6A576-C320-4550-B7F8-4FCAE82FB06A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8418AF63-E280-4CE2-8E5C-DCD00ABE6557\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287\"}, {\"lang\": \"es\", \"value\": \"Una escalada de privilegios local por medio de una tuber\\u00eda con nombre debido a comprobaciones de control de acceso inapropiadas. Los siguientes productos est\\u00e1n afectados: Acronis Cyber Protect 15 (Windows) versiones anteriores a la compilaci\\u00f3n 28035, Acronis Agent (Windows) versiones anteriores a la compilaci\\u00f3n 27147, Acronis Cyber Protect Home Office (Windows) versiones anteriores a la compilaci\\u00f3n 39612, Acronis True Image 2021 (Windows) versiones anteriores a la compilaci\\u00f3n 39287\"}]",
"id": "CVE-2021-44204",
"lastModified": "2024-11-21T06:30:34.300",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-02-04T23:15:12.013",
"references": "[{\"url\": \"https://security-advisory.acronis.com/advisories/SEC-2355\", \"source\": \"security@acronis.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security-advisory.acronis.com/advisories/SEC-2355\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@acronis.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security@acronis.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-285\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-44204\",\"sourceIdentifier\":\"security@acronis.com\",\"published\":\"2022-02-04T23:15:12.013\",\"lastModified\":\"2024-11-21T06:30:34.300\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287\"},{\"lang\":\"es\",\"value\":\"Una escalada de privilegios local por medio de una tuber\u00eda con nombre debido a comprobaciones de control de acceso inapropiadas. Los siguientes productos est\u00e1n afectados: Acronis Cyber Protect 15 (Windows) versiones anteriores a la compilaci\u00f3n 28035, Acronis Agent (Windows) versiones anteriores a la compilaci\u00f3n 27147, Acronis Cyber Protect Home Office (Windows) versiones anteriores a la compilaci\u00f3n 39612, Acronis True Image 2021 (Windows) versiones anteriores a la compilaci\u00f3n 39287\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@acronis.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:true_image:2021:*:*:*:*:-:*:*\",\"matchCriteriaId\":\"7DC81A5D-044A-44EF-8695-748A63778291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B1CFEB0F-588B-4B88-9169-4ADB6396C1C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:true_image:2021:update_2:*:*:*:windows:*:*\",\"matchCriteriaId\":\"54BE6067-0357-4C68-AA06-CB5EEA3DD86F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:windows:*:*\",\"matchCriteriaId\":\"02D1EBBC-47EE-4C46-AA69-DD0B7DE1B173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:true_image:2021:update_4:*:*:*:windows:*:*\",\"matchCriteriaId\":\"0CF1A7BF-9B93-4D7C-BCD8-30DEF789B46B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:true_image:2021:update_5:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55B6ED7-C602-4C7B-88C5-B0499D61EB1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"c21.06\",\"matchCriteriaId\":\"85D71339-7F19-41DC-B6D2-BF776F472EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"89899D10-1343-4276-919A-9C1DF2DB8B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A77B2499-B3A4-4278-BA0D-59AB59C60352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF6A576-C320-4550-B7F8-4FCAE82FB06A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8418AF63-E280-4CE2-8E5C-DCD00ABE6557\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://security-advisory.acronis.com/advisories/SEC-2355\",\"source\":\"security@acronis.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security-advisory.acronis.com/advisories/SEC-2355\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…