📦 Cyber Protect Home Office
by Acronis
🔍 What is Cyber Protect Home Office?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Acronis Cyber Protect Home Office for Windows allows unauthorized users to access and manipulate sensitive information due to missing authorization checks. It affects Windows use...
This CVE describes a DLL hijacking vulnerability in Acronis Cyber Protect products for Windows that allows local attackers to escalate privileges. Attackers can place malicious DLLs in directories whe...
This vulnerability allows local attackers to access sensitive information due to insecure folder permissions in Acronis Cyber Protect Home Office for Windows. Attackers can read files containing crede...
This vulnerability allows local attackers to escalate privileges during installation of Acronis Cyber Protect Home Office on Windows systems. Attackers can exploit improper handling of symbolic links ...
This CVE describes a local privilege escalation vulnerability in Acronis products for Windows. It allows a local low-privileged user to gain SYSTEM-level privileges by exploiting insecure driver commu...
This CVE describes a local privilege escalation vulnerability in Acronis products for Windows. It allows a local attacker with low privileges to gain SYSTEM-level access due to insecure driver communi...
CVE-2022-4418 is a local privilege escalation vulnerability in Acronis Cyber Protect Home Office for Windows that allows attackers to load unsigned libraries and gain elevated privileges. This affects...
This vulnerability allows local attackers to escalate privileges on macOS systems by exploiting unrestricted loading of unsigned libraries in Acronis software. It affects users of Acronis Cyber Protec...
This CVE describes a local privilege escalation vulnerability in Acronis Windows products where child processes receive excessive permissions. An attacker with local access can exploit this to gain SY...
This vulnerability allows local attackers to escalate privileges on Windows systems by exploiting improper access control checks on named pipes. Attackers can gain SYSTEM-level privileges by connectin...
This CVE describes a DLL hijacking vulnerability in Acronis Media Builder service that allows local attackers to escalate privileges on Windows systems. Attackers can place malicious DLLs in directori...