CVE-2024-55543

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Acronis Cyber Protect 16 for Windows due to DLL hijacking. Attackers with local access can exploit this to execute arbitrary code with SYSTEM privileges. Only Windows installations of Acronis Cyber Protect 16 before build 39169 are affected.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 16
Versions: All versions before build 39169
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Linux and other OS versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where an attacker gains SYSTEM privileges, potentially installing persistent malware, accessing all data, and controlling the entire system.

🟠

Likely Case

Local attackers escalate privileges from standard user to administrator/SYSTEM level to bypass security controls, install unauthorized software, or access protected resources.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems where attackers already have local access but cannot pivot to other systems.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system, not remotely exploitable.
🏢 Internal Only: HIGH - Attackers with local access (malicious insiders, compromised accounts) can exploit this to gain full control of affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to place malicious DLL in specific directory. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 39169 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-6418

Restart Required: No

Instructions:

1. Open Acronis Cyber Protect 16. 2. Navigate to Help > About. 3. Check current build number. 4. If below 39169, download and install the latest update from Acronis portal. 5. Verify installation completes successfully.

🔧 Temporary Workarounds

Restrict DLL search path permissions

Windows

Set restrictive permissions on directories where Acronis searches for DLLs to prevent unauthorized DLL placement

icacls "C:\Program Files\Acronis\*" /deny Everyone:(OI)(CI)(WD,AD)

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges on affected systems
  • Monitor for suspicious DLL loading events and file creation in Acronis directories

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect 16 build number via Help > About in the application interface

Check Version:

wmic product where "name like 'Acronis Cyber Protect%'" get version

Verify Fix Applied:

Confirm build number is 39169 or higher after update installation

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Acronis application logs showing abnormal startup behavior

Network Indicators:

  • No network indicators - this is a local exploit

SIEM Query:

EventID=7 AND (ImagePath:*Acronis* OR ProcessName:*Acronis*) AND (FileName:*.dll)

🔗 References

📤 Share & Export