First published: Wed Oct 21 2020(Updated: )
Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Acronis True Image | =2021 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10139 is a vulnerability found in Acronis True Image 2021 that includes an OpenSSL component.
The severity of CVE-2020-10139 is high with a CVSS score of 7.8.
CVE-2020-10139 affects Acronis True Image 2021 by allowing unprivileged Windows users to create subdirectories off of the system root, potentially compromising the system.
To fix CVE-2020-10139, it is recommended to update Acronis True Image 2021 to the latest version provided by the vendor.
More information about CVE-2020-10139 can be found on the CERT Coordination Center advisory at https://www.kb.cert.org/vuls/id/114757.