CVE-2021-44204

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on Windows systems by exploiting improper access control checks on named pipes. Attackers can gain SYSTEM-level privileges by connecting to and manipulating these pipes. Affected users include anyone running vulnerable versions of Acronis Cyber Protect, Acronis Agent, Acronis Cyber Protect Home Office, or Acronis True Image 2021 on Windows.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 15 (Windows)
  • Acronis Agent (Windows)
  • Acronis Cyber Protect Home Office (Windows)
  • Acronis True Image 2021 (Windows)
Versions: Acronis Cyber Protect 15 before build 28035, Acronis Agent before build 27147, Acronis Cyber Protect Home Office before build 39612, Acronis True Image 2021 before build 39287
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of these products. The vulnerability exists in the named pipe implementation with improper access control checks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and full control over the affected system.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM privileges, allowing attackers to bypass security controls, install additional malware, or access protected system resources.

🟢

If Mitigated

Limited impact if proper access controls are enforced and least privilege principles are followed, though the vulnerability still provides a foothold for attackers.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with local access (including malware or compromised user accounts) can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system but is relatively straightforward once access is obtained. No public exploit code was mentioned in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Cyber Protect 15 build 28035+, Acronis Agent build 27147+, Acronis Cyber Protect Home Office build 39612+, Acronis True Image 2021 build 39287+

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-2355

Restart Required: Yes

Instructions:

1. Download the latest version from Acronis official website or update through the product interface. 2. Install the update following the vendor's instructions. 3. Restart the system to ensure all components are updated.

🔧 Temporary Workarounds

Restrict Named Pipe Access

windows

Configure Windows security policies to restrict access to vulnerable named pipes used by Acronis products.

Use Windows Security Policy or PowerShell to set appropriate ACLs on named pipes used by Acronis processes

Disable Vulnerable Components

windows

Temporarily disable Acronis services if they are not critically needed until patching can be completed.

sc stop "Acronis services"
sc config "Acronis services" start= disabled

🧯 If You Can't Patch

  • Implement strict least privilege principles and limit local user access to systems running vulnerable Acronis software.
  • Monitor for suspicious process creation and named pipe activity using endpoint detection and response (EDR) tools.

🔍 How to Verify

Check if Vulnerable:

Check the Acronis product version in the application interface or through Windows Programs and Features. Compare against vulnerable build numbers.

Check Version:

Check through Acronis product interface or examine installed programs in Windows Control Panel

Verify Fix Applied:

Verify the installed build number is equal to or higher than the patched versions listed in the fix section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual named pipe creation or access attempts by non-SYSTEM users
  • Suspicious process creation with SYSTEM privileges from user accounts
  • Access denied events for named pipe operations

Network Indicators:

  • Local named pipe communication patterns that deviate from normal Acronis behavior

SIEM Query:

Process Creation where Parent Process contains 'Acronis' AND Integrity Level changes to 'System'

🔗 References

📤 Share & Export