First published: Wed Oct 21 2020(Updated: )
Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Acronis Cyber Backup | <12.5 | |
Acronis Cyber Protect | <15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-10138 is high with a CVSS score of 7.8.
Acronis Cyber Backup 12.5 and Acronis Cyber Protect 15 are affected by CVE-2020-10138.
CVE-2020-10138 is a vulnerability in Acronis Cyber Backup and Cyber Protect that includes an OpenSSL component with a misconfigured OPENSSLDIR variable.
This vulnerability can be exploited by unprivileged Windows users to gain unauthorized access to the privileged service in Acronis Cyber Backup and Cyber Protect.
Yes, Acronis has released a patch to address the vulnerability. It is recommended to update to the latest version of Acronis Cyber Backup or Cyber Protect.