First published: Tue May 25 2021(Updated: )
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Acronis True Image | =24.5.22510 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9451 is considered to be of medium severity due to its potential for exploitation by an unprivileged user.
To mitigate CVE-2020-9451, ensure that the log folder for anti_ransomware_service.exe has restricted permissions that prevent unprivileged users from writing to it.
CVE-2020-9451 affects Acronis True Image 2020 version 24.5.22510 specifically.
An unprivileged user can exploit CVE-2020-9451 by creating a hardlink to a log file that is expected to be generated by anti_ransomware_service.exe.
As of the last report, there have been no confirmed active exploits in the wild for CVE-2020-9451.