CVE-2025-24830

6.3 MEDIUM

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Acronis Cyber Protect Cloud Agent for Windows. Attackers can exploit DLL hijacking to execute arbitrary code with elevated privileges. Only Windows systems running vulnerable versions of the Acronis agent are affected.

💻 Affected Systems

Products:
  • Acronis Cyber Protect Cloud Agent
Versions: Windows versions before build 39378
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of the Acronis agent; requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where an attacker gains SYSTEM privileges, installs persistent malware, accesses sensitive data, and moves laterally across the network.

🟠

Likely Case

Local attackers escalate privileges from standard user to administrator/SYSTEM level to bypass security controls and install additional malicious software.

🟢

If Mitigated

Limited impact if proper endpoint protection, application whitelisting, and least privilege principles are enforced, though local privilege escalation remains possible.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access; not directly exploitable over the internet.
🏢 Internal Only: HIGH - Malicious insiders or attackers who gain initial foothold can exploit this to escalate privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities typically have low exploitation complexity but require local access and ability to place malicious DLLs in specific directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 39378 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-7829

Restart Required: Yes

Instructions:

1. Update Acronis Cyber Protect Cloud Agent to build 39378 or later. 2. Restart the system to ensure the updated agent loads properly. 3. Verify the update was successful using the verification steps below.

🔧 Temporary Workarounds

Restrict DLL search path permissions

windows

Set restrictive permissions on directories where the Acronis agent searches for DLLs to prevent unauthorized DLL placement

icacls "C:\Program Files\Acronis\" /deny Everyone:(OI)(CI)(W)

Enable DLL Safe Search Mode

windows

Configure Windows to use Safe DLL Search Mode which searches system directories first

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized DLLs
  • Enforce least privilege principles and restrict standard users from writing to program directories

🔍 How to Verify

Check if Vulnerable:

Check Acronis agent version: Open Acronis Management Console or check installed programs for version/build number

Check Version:

wmic product where "name like 'Acronis%'" get version

Verify Fix Applied:

Verify agent version is 39378 or higher and test DLL loading behavior from non-system directories

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loads from non-system directories in Acronis process logs
  • Windows Event ID 4688 showing Acronis processes loading DLLs from unusual locations

Network Indicators:

  • No direct network indicators as this is local exploitation

SIEM Query:

EventID=4688 AND ProcessName="*Acronis*" AND (NewProcessName="*.dll" OR CommandLine="*.dll")

🔗 References

📤 Share & Export