CVE-2025-24828

6.3 MEDIUM

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Acronis Cyber Protect Cloud Agent for Windows. Attackers can exploit DLL hijacking to execute arbitrary code with elevated privileges. Only Windows systems running vulnerable versions of the Acronis agent are affected.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Cloud Agent
Versions: All versions before build 39378
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of the Acronis agent. The vulnerability exists in the default installation configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access can gain SYSTEM-level privileges, potentially compromising the entire Windows host and accessing sensitive data or deploying persistent malware.

🟠

Likely Case

Malicious users or malware with initial foothold can escalate privileges to install additional payloads, disable security controls, or move laterally within the network.

🟢

If Mitigated

With proper endpoint security controls and least privilege principles, exploitation would be limited to specific user contexts rather than full SYSTEM compromise.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a vulnerable system, they can easily escalate privileges to compromise the entire machine.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities typically have low exploitation complexity once an attacker gains initial access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 39378 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-7842

Restart Required: Yes

Instructions:

1. Update Acronis Cyber Protect Cloud Agent to build 39378 or later. 2. Restart the system to ensure the updated agent loads properly. 3. Verify the agent is running the patched version.

🔧 Temporary Workarounds

Restrict DLL search path permissions

windows

Set restrictive permissions on directories where the Acronis agent searches for DLLs to prevent unauthorized DLL placement

icacls "C:\Program Files\Acronis\" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"

Enable DLL Safe Search Mode

windows

Configure Windows to use Safe DLL Search Mode which searches system directories first

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement strict file system permissions to prevent unauthorized users from writing to directories where Acronis searches for DLLs.
  • Deploy application whitelisting solutions to prevent execution of unauthorized DLLs in Acronis directories.

🔍 How to Verify

Check if Vulnerable:

Check the Acronis agent version in Control Panel > Programs and Features or run 'wmic product get name,version' and look for Acronis Cyber Protect Cloud Agent version lower than build 39378.

Check Version:

wmic product where "name like '%Acronis Cyber Protect Cloud Agent%'" get version

Verify Fix Applied:

Verify the agent version shows build 39378 or higher and test that the agent functions normally after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DLL loading from non-standard locations in Windows Event Logs (Event ID 7)
  • Acronis agent process loading DLLs from user-writable directories

Network Indicators:

  • No direct network indicators as this is a local privilege escalation

SIEM Query:

EventID=7 AND ProcessName="*acronis*" AND ImageLoaded="*.dll" AND NOT ImageLoaded="*system32*" AND NOT ImageLoaded="*program files*acronis*"

🔗 References

📤 Share & Export