CVE-2024-34019

7.3 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Acronis Snap Deploy for Windows due to DLL hijacking. Attackers with local access can place malicious DLLs in directories where the application searches, potentially gaining SYSTEM privileges. Only Windows users running vulnerable versions of Acronis Snap Deploy are affected.

💻 Affected Systems

Products:
  • Acronis Snap Deploy (Windows)
Versions: All versions before build 4569
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system. The vulnerability exists in how the application loads DLLs from insecure locations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local user or malware with basic privileges escalates to administrative rights, allowing installation of additional malware, disabling security controls, or accessing sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Internal attackers or malware with local access can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking is a well-known attack vector. While no public PoC is mentioned, the technique is straightforward for attackers familiar with Windows DLL loading.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 4569 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-3079

Restart Required: Yes

Instructions:

1. Download the latest version of Acronis Snap Deploy from the official Acronis website. 2. Install the update following the vendor's installation guide. 3. Restart the system to ensure all components are updated.

🔧 Temporary Workarounds

Restrict write permissions to application directories

windows

Prevent unauthorized users from writing DLLs to directories where Acronis Snap Deploy searches for libraries.

icacls "C:\Program Files\Acronis\SnapDeploy\" /deny *S-1-1-0:(OI)(CI)(W)

Enable DLL Safe Search Mode

windows

Configure Windows to use SafeDllSearchMode to prioritize system directories over current directory.

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into systems running Acronis Snap Deploy.
  • Monitor for suspicious DLL creation in application directories and unexpected privilege escalation events.

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Snap Deploy version in the application's About section or installation directory. Versions before build 4569 are vulnerable.

Check Version:

Check the application's About dialog or examine the executable properties in "C:\Program Files\Acronis\SnapDeploy\"

Verify Fix Applied:

Verify the installed version is build 4569 or later. Check that the patch installation completed successfully without errors.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 (process creation) showing Acronis processes loading DLLs from unusual locations
  • Security logs showing privilege escalation from standard user to SYSTEM

Network Indicators:

  • None - this is a local attack vector

SIEM Query:

EventID=4688 AND (ProcessName="*Acronis*" OR ProcessName="*snapdeploy*") AND (CommandLine="*dll*" OR NewProcessName="*dll*")

🔗 References

📤 Share & Export