CVE-2022-30696

7.8 HIGH

📋 TL;DR

This CVE describes a DLL hijacking vulnerability in Acronis Snap Deploy for Windows that allows local attackers to escalate privileges. Attackers can place malicious DLLs in specific directories to execute arbitrary code with elevated permissions. Only Windows systems running vulnerable versions of Acronis Snap Deploy are affected.

💻 Affected Systems

Products:
  • Acronis Snap Deploy
Versions: All versions before build 3640
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of Acronis Snap Deploy. The vulnerability exists in how the application loads DLLs from insecure locations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where an attacker gains SYSTEM/administrator privileges, enabling complete control over the affected system, data theft, persistence mechanisms, and lateral movement capabilities.

🟠

Likely Case

Local privilege escalation from a standard user account to administrator/SYSTEM privileges, allowing installation of malware, modification of system settings, and bypassing security controls.

🟢

If Mitigated

Limited impact with proper access controls, application whitelisting, and least privilege principles in place, potentially preventing successful exploitation.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with local access (including malware, malicious insiders, or compromised user accounts) can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities typically have low exploitation complexity. Requires local access and ability to write files to specific directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 3640 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-3081

Restart Required: Yes

Instructions:

1. Download the latest version of Acronis Snap Deploy from the official Acronis website. 2. Run the installer to update to build 3640 or later. 3. Restart the system to ensure all changes take effect.

🔧 Temporary Workarounds

Restrict write permissions to application directories

windows

Prevent non-administrative users from writing to directories where Acronis Snap Deploy searches for DLLs

icacls "C:\Program Files\Acronis\SnapDeploy\" /deny Users:(OI)(CI)W
icacls "C:\Program Files (x86)\Acronis\SnapDeploy\" /deny Users:(OI)(CI)W

Enable DLL Safe Search Mode

windows

Configure Windows to search for DLLs only in secure locations

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "SafeDllSearchMode" -Value 1

🧯 If You Can't Patch

  • Remove Acronis Snap Deploy from systems where it's not essential
  • Implement strict application control policies to prevent unauthorized DLL loading
  • Monitor for suspicious DLL loading events using Windows Event Logs or EDR solutions

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Snap Deploy version in the application's About dialog or by examining the installed program version in Control Panel > Programs and Features.

Check Version:

wmic product where "name like 'Acronis Snap Deploy%'" get version

Verify Fix Applied:

Verify the installed version is build 3640 or later. Check that the vulnerable DLL loading behavior has been corrected by the vendor.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (Process Creation) showing Acronis processes loading DLLs from unusual locations
  • Sysmon Event ID 7 (Image loaded) showing DLLs loaded from user-writable directories by Acronis processes

Network Indicators:

  • No network indicators as this is a local privilege escalation vulnerability

SIEM Query:

source="Windows Security" EventID=4688 AND (ProcessName="*Acronis*" OR ParentProcessName="*Acronis*") AND CommandLine="*dll*"

🔗 References

📤 Share & Export