CVE-2024-34017

7.3 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Acronis Snap Deploy for Windows due to DLL hijacking. Attackers with local access can exploit insecure DLL loading to execute arbitrary code with SYSTEM privileges. Only Windows users running vulnerable versions of Acronis Snap Deploy are affected.

💻 Affected Systems

Products:
  • Acronis Snap Deploy
Versions: All versions before build 4569
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system; the vulnerable component loads DLLs from insecure locations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local attackers escalate from standard user to administrator/SYSTEM privileges to bypass security controls, install unauthorized software, or access sensitive data.

🟢

If Mitigated

Limited impact with proper access controls, application whitelisting, and least privilege principles preventing unauthorized local execution.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access; not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any compromised user account or malicious insider with local access can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking is a well-known technique; exploitation requires local access but minimal technical skill once the vulnerable DLL path is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 4569 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-4505

Restart Required: Yes

Instructions:

1. Download the latest version of Acronis Snap Deploy from the official Acronis website. 2. Run the installer to update to build 4569 or later. 3. Restart the system to ensure all components are properly loaded.

🔧 Temporary Workarounds

Restrict DLL search path

windows

Use application control policies to restrict where DLLs can be loaded from, preventing hijacking from user-writable directories.

Configure via Windows AppLocker or Software Restriction Policies

Remove vulnerable permissions

windows

Remove write permissions for standard users on directories where the vulnerable application searches for DLLs.

icacls "C:\path\to\vulnerable\directory" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict least privilege principles: ensure no users have administrative rights unless absolutely necessary.
  • Deploy application whitelisting to prevent execution of unauthorized binaries and DLLs from user-writable locations.

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Snap Deploy version in the application's About dialog or installed programs list; versions before build 4569 are vulnerable.

Check Version:

Check via Programs and Features in Control Panel or run: wmic product where name="Acronis Snap Deploy" get version

Verify Fix Applied:

Verify the installed version is build 4569 or later and check that DLL hijacking attempts from user-writable directories are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations (Event ID 7 in Sysmon)
  • Failed DLL loading attempts from non-standard paths

Network Indicators:

  • No direct network indicators as this is local exploitation

SIEM Query:

EventID=7 AND (Image LIKE '%snapdeploy%' OR ProcessName LIKE '%snapdeploy%') AND (ImageLoaded LIKE '%Users%' OR ImageLoaded LIKE '%Temp%')

🔗 References

📤 Share & Export