CVE-2022-0483

7.8 HIGH

📋 TL;DR

CVE-2022-0483 is a local privilege escalation vulnerability in Acronis VSS Doctor for Windows caused by insecure folder permissions. This allows authenticated local users to execute arbitrary code with SYSTEM privileges. Only Windows systems running vulnerable versions of Acronis VSS Doctor are affected.

💻 Affected Systems

Products:
  • Acronis VSS Doctor
Versions: All versions before build 53
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires local user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full SYSTEM privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement capabilities.

🟠

Likely Case

Malicious insider or compromised user account escalates to SYSTEM to install malware, steal credentials, or bypass security controls.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to authorized users who already have some local access.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access. The vulnerability is in folder permissions, making exploitation straightforward for attackers with local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 53 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-3354

Restart Required: Yes

Instructions:

1. Download and install Acronis VSS Doctor build 53 or later from official Acronis sources. 2. Restart the system to ensure all components are updated. 3. Verify the installation by checking the version number.

🔧 Temporary Workarounds

Restrict folder permissions

windows

Manually adjust folder permissions to remove write access for non-administrative users

icacls "C:\Program Files\Acronis\VSS Doctor\" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"

Disable vulnerable service

windows

Temporarily disable Acronis VSS Doctor service if not critically needed

sc stop "Acronis VSS Doctor"
sc config "Acronis VSS Doctor" start= disabled

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit local user permissions
  • Monitor for suspicious privilege escalation attempts and file system modifications

🔍 How to Verify

Check if Vulnerable:

Check Acronis VSS Doctor version: Open the application and verify version is below build 53

Check Version:

wmic product where "name like 'Acronis VSS Doctor%'" get version

Verify Fix Applied:

Confirm Acronis VSS Doctor version is build 53 or higher and verify folder permissions are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation attempts
  • File system audit logs showing modifications to Acronis VSS Doctor folders
  • Process creation logs showing unexpected SYSTEM privilege processes

Network Indicators:

  • No network indicators as this is a local privilege escalation

SIEM Query:

EventID=4688 AND NewProcessName CONTAINS 'Acronis' AND SubjectUserName != 'SYSTEM' AND TokenElevationType != '%%1936'

🔗 References

📤 Share & Export