First published: Thu Aug 31 2023(Updated: )
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979.
Credit: security@acronis.com security@acronis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Acronis Agent | <c22.10 | |
Acronis Cyber Protect | =15 | |
Acronis Cyber Protect | =15-update1 | |
Acronis Cyber Protect | =15-update2 | |
Acronis Cyber Protect | =15-update3 | |
Acronis Cyber Protect | =15-update4 | |
Acronis Cyber Protect | =15-update5 | |
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-41744.
The severity of CVE-2023-41744 is high.
Acronis Agent (macOS) before build 30600 and Acronis Cyber Protect 15 (macOS) before build 35979 are affected.
CVE-2023-41744 allows local privilege escalation due to unrestricted loading of unsigned libraries.
No, Apple macOS is not affected by CVE-2023-41744.
To fix CVE-2023-41744, update Acronis Agent to build 30600 or later, and update Acronis Cyber Protect 15 to build 35979 or later.
You can find more information about CVE-2023-41744 [here](https://security-advisory.acronis.com/advisories/SEC-4728).