CVE-2023-45248

7.3 HIGH

📋 TL;DR

This CVE describes a DLL hijacking vulnerability in Acronis Cyber Protect products on Windows that allows local attackers to escalate privileges. An authenticated user could place a malicious DLL in a specific location to execute code with higher privileges. Affected users include those running vulnerable versions of Acronis Cyber Protect Cloud Agent or Acronis Cyber Protect 16 on Windows systems.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Cloud Agent (Windows)
  • Acronis Cyber Protect 16 (Windows)
Versions: Acronis Cyber Protect Cloud Agent before build 36497, Acronis Cyber Protect 16 before build 37391
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Authenticated user escalates to higher privileges, potentially installing malware, accessing sensitive data, or bypassing security controls.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain elevated privileges on affected Windows systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to place malicious DLL in specific directory. DLL hijacking is a well-known technique with established exploitation patterns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Cyber Protect Cloud Agent build 36497 or later, Acronis Cyber Protect 16 build 37391 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-6052

Restart Required: Yes

Instructions:

1. Download latest version from Acronis portal. 2. Run installer with administrative privileges. 3. Restart affected systems. 4. Verify successful update.

🔧 Temporary Workarounds

Restrict DLL write permissions

windows

Set restrictive permissions on directories where Acronis loads DLLs to prevent unauthorized writes.

icacls "C:\Program Files\Acronis\*" /deny Users:(OI)(CI)W
icacls "C:\Program Files (x86)\Acronis\*" /deny Users:(OI)(CI)W

Enable DLL Safe Search Mode

windows

Configure Windows to search for DLLs only in secure locations.

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "SafeDllSearchMode" -Value 1

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into affected systems.
  • Monitor for suspicious DLL creation/modification in Acronis directories using file integrity monitoring.

🔍 How to Verify

Check if Vulnerable:

Check Acronis agent version in Control Panel > Programs and Features or via 'acronis_agent.exe --version' command.

Check Version:

acronis_agent.exe --version

Verify Fix Applied:

Verify version is at or above build 36497 (Cloud Agent) or 37391 (Cyber Protect 16). Check that no unauthorized DLLs exist in Acronis directories.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loads from Acronis processes
  • File creation/modification in Acronis program directories by non-administrative users
  • Process creation with parent Acronis processes

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4663 OR EventID=4656 AND ObjectName LIKE '%Acronis%' AND Accesses LIKE '%WRITE_DAC%' OR '%WRITE_OWNER%'

🔗 References

📤 Share & Export