CVE-2022-46869

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges during installation of Acronis Cyber Protect Home Office on Windows systems. Attackers can exploit improper handling of symbolic links to gain elevated system permissions. Only Windows users running vulnerable versions of this specific Acronis product are affected.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Home Office
Versions: All Windows versions before build 40278
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installation process on Windows systems. Requires local access to the system during installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, malware installation, and persistence establishment.

🟠

Likely Case

Local user with limited privileges gains administrative access to install unauthorized software, modify system settings, or access protected data.

🟢

If Mitigated

With proper user access controls and limited local user privileges, impact is contained to the compromised user account only.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal users with local access to vulnerable systems could exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and knowledge of symbolic link manipulation techniques. The vulnerability is in the installation process.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 40278 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-3835

Restart Required: Yes

Instructions:

1. Download latest version from Acronis website. 2. Uninstall current version. 3. Install updated version (build 40278+). 4. Restart system.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Limit standard user accounts to prevent exploitation attempts

Monitor installation processes

windows

Implement application control to monitor and restrict installation activities

🧯 If You Can't Patch

  • Restrict physical and remote access to vulnerable systems
  • Implement strict user privilege management and monitor for unusual installation activities

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect Home Office version in program settings or Control Panel > Programs and Features

Check Version:

wmic product where name='Acronis Cyber Protect Home Office' get version

Verify Fix Applied:

Verify installed version is build 40278 or higher in program settings

📡 Detection & Monitoring

Log Indicators:

  • Unusual installation processes, symbolic link creation events, privilege escalation attempts

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4688 OR EventID=4689 with process name containing 'Acronis' AND target process with elevated privileges

🔗 References

📤 Share & Export