CVE-2023-48677

7.8 HIGH

📋 TL;DR

This CVE describes a DLL hijacking vulnerability in Acronis Cyber Protect products for Windows that allows local attackers to escalate privileges. Attackers can place malicious DLLs in directories where the application searches for them, potentially gaining SYSTEM-level access. Affected users include those running vulnerable versions of Acronis Cyber Protect Home Office, Cyber Protect Cloud Agent, or Cyber Protect 16 on Windows systems.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Home Office (Windows)
  • Acronis Cyber Protect Cloud Agent (Windows)
  • Acronis Cyber Protect 16 (Windows)
Versions: Acronis Cyber Protect Home Office before build 40901, Acronis Cyber Protect Cloud Agent before build 39378, Acronis Cyber Protect 16 before build 39938
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in how the applications search for and load DLLs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement capabilities.

🟠

Likely Case

Local user or malware with limited privileges escalates to administrator/SYSTEM level to install additional malware, disable security controls, or access sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Internal attackers or malware with initial foothold can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities typically have low exploitation complexity for attackers with local access. The attacker needs write access to directories searched by the application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis Cyber Protect Home Office build 40901 or later, Acronis Cyber Protect Cloud Agent build 39378 or later, Acronis Cyber Protect 16 build 39938 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-5620

Restart Required: Yes

Instructions:

1. Open Acronis Cyber Protect application. 2. Check for updates in settings/help menu. 3. Download and install available updates. 4. Restart the system as prompted. 5. Verify the version is updated to patched build.

🔧 Temporary Workarounds

Restrict write permissions to application directories

windows

Prevent unauthorized users from writing DLLs to directories where Acronis applications search for them.

icacls "C:\Program Files\Acronis\" /deny Users:(OI)(CI)W
icacls "C:\Program Files (x86)\Acronis\" /deny Users:(OI)(CI)W

Enable Windows Defender Application Control

windows

Use WDAC to restrict which DLLs can be loaded by applications.

🧯 If You Can't Patch

  • Remove local user accounts with limited privileges from affected systems
  • Implement strict file integrity monitoring on Acronis application directories

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect version in application settings or Control Panel > Programs and Features. Compare against vulnerable builds.

Check Version:

wmic product where "name like 'Acronis%'" get name, version

Verify Fix Applied:

Verify the installed version meets or exceeds the patched build numbers: Home Office >= 40901, Cloud Agent >= 39378, Cyber Protect 16 >= 39938.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Process Monitor logs showing Acronis processes loading DLLs from user-writable directories
  • Unexpected privilege escalation events

Network Indicators:

  • No network indicators as this is a local attack

SIEM Query:

EventID=4688 OR EventID=4689 AND ProcessName LIKE '%Acronis%' AND NewIntegrityLevel='System'

🔗 References

📤 Share & Export