First published: Tue May 25 2021(Updated: )
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe exposes a REST API that can be used by everyone, even unprivileged users. This API is used to communicate from the GUI to anti_ransomware_service.exe. This can be exploited to add an arbitrary malicious executable to the whitelist, or even exclude an entire drive from being monitored by anti_ransomware_service.exe.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Acronis True Image | =24.5.22510 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9450 has a high severity rating due to its potential to allow unauthorized access to the REST API.
To fix CVE-2020-9450, users should update to the latest version of Acronis True Image that addresses this vulnerability.
Exploiting CVE-2020-9450 can allow an attacker to execute arbitrary commands and potentially install malicious software.
CVE-2020-9450 affects all users of Acronis True Image version 24.5.22510.
The vulnerable component in CVE-2020-9450 is the anti_ransomware_service.exe which exposes an unsecured REST API.