CVE-2026-28712

6.3 MEDIUM

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Acronis Cyber Protect 17 for Windows due to DLL hijacking. Attackers with local access can exploit improper DLL loading to execute arbitrary code with SYSTEM privileges. Only Windows installations of Acronis Cyber Protect 17 before build 41186 are affected.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 17
Versions: All versions before build 41186
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations; other platforms are not vulnerable. Requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full SYSTEM privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement capabilities.

🟠

Likely Case

Malicious insider or malware with initial foothold escalates privileges to install additional payloads, disable security controls, or access sensitive system resources.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the compromised user account's permissions.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access; not directly exploitable over the network.
🏢 Internal Only: HIGH - Any compromised user account on affected systems can escalate to SYSTEM privileges, posing significant internal threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities typically have low exploitation complexity once the vulnerable DLL path is identified. Requires local access to plant malicious DLL.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 41186 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-2332

Restart Required: Yes

Instructions:

1. Download latest Acronis Cyber Protect 17 update from official Acronis portal. 2. Run installer with administrative privileges. 3. Restart system when prompted. 4. Verify build version is 41186 or higher.

🔧 Temporary Workarounds

Restrict write permissions to application directories

windows

Prevent users from writing to Acronis installation directories to block DLL planting.

icacls "C:\Program Files\Acronis\" /deny Users:(OI)(CI)W

Enable DLL Safe Search Mode

windows

Configure Windows to search for DLLs only in secure locations.

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit local user permissions
  • Monitor for suspicious DLL loading events and file creation in Acronis directories

🔍 How to Verify

Check if Vulnerable:

Check Acronis Cyber Protect version in Control Panel > Programs and Features. If version is earlier than build 41186, system is vulnerable.

Check Version:

wmic product where "name like 'Acronis Cyber Protect%'" get version

Verify Fix Applied:

Verify build number is 41186 or higher in Acronis Cyber Protect interface or Windows Programs and Features.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4663 (File system access) showing unauthorized writes to Acronis directories
  • Sysmon Event ID 11 (FileCreate) for DLL files in Acronis paths

Network Indicators:

  • No network indicators - this is a local attack

SIEM Query:

source="windows" AND (event_id=4663 OR event_id=11) AND (file_path="*Acronis*" AND file_name="*.dll")

🔗 References

📤 Share & Export