CVE-2025-11178

7.3 HIGH

📋 TL;DR

This CVE describes a DLL hijacking vulnerability in Acronis True Image products for Windows that allows local attackers to escalate privileges. Attackers can place malicious DLLs in directories where the application searches for them, potentially executing arbitrary code with higher privileges. Users of affected Acronis True Image versions on Windows systems are vulnerable.

💻 Affected Systems

Products:
  • Acronis True Image (Windows)
  • Acronis True Image for Western Digital (Windows)
  • Acronis True Image for SanDisk (Windows)
Versions: Acronis True Image before build 42386, Acronis True Image for Western Digital before build 42636, Acronis True Image for SanDisk before build 42679
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of these products. Requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where an attacker gains SYSTEM/administrator privileges, installs persistent malware, accesses sensitive data, or disables security controls.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass user account controls, install additional malware, or access restricted system resources.

🟢

If Mitigated

Limited impact if proper application whitelisting, DLL search path restrictions, and least privilege principles are enforced.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Malicious insiders or attackers who gain initial access through other means can exploit this to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities typically have low exploitation complexity but require local access and ability to write to specific directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Acronis True Image build 42386 or later, Acronis True Image for Western Digital build 42636 or later, Acronis True Image for SanDisk build 42679 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-7078

Restart Required: Yes

Instructions:

1. Open Acronis True Image. 2. Go to Help > Check for updates. 3. Follow prompts to download and install the latest version. 4. Restart your computer after installation completes.

🔧 Temporary Workarounds

Restrict DLL search paths

windows

Use Windows policies or application control solutions to restrict where applications can load DLLs from.

Remove write permissions from application directories

windows

Remove write permissions for non-administrative users from directories where Acronis True Image searches for DLLs.

🧯 If You Can't Patch

  • Uninstall affected Acronis True Image versions if not essential
  • Implement strict application control policies to prevent unauthorized DLL loading

🔍 How to Verify

Check if Vulnerable:

Check Acronis True Image version in Help > About. If version is below the patched builds listed, you are vulnerable.

Check Version:

Not applicable - check version through application GUI

Verify Fix Applied:

Verify Acronis True Image version is at or above the patched builds: 42386 for standard version, 42636 for WD version, 42679 for SanDisk version.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Process Monitor logs showing DLL hijacking attempts

Network Indicators:

  • No network indicators - local privilege escalation

SIEM Query:

EventID=7 OR EventID=11 from Sysmon showing DLL loading from non-standard paths for Acronis processes

🔗 References

📤 Share & Export