7.3

CVE-2024-34019

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.

Data is provided by the National Vulnerability Database (NVD)
AcronisSnap Deploy SwPlatformwindows Version < 6
AcronisSnap Deploy Version6 Update- SwPlatformwindows
AcronisSnap Deploy Version6 Updateupdate1 SwPlatformwindows
AcronisSnap Deploy Version6 Updateupdate1.1 SwPlatformwindows
AcronisSnap Deploy Version6 Updateupdate1.2 SwPlatformwindows
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.053
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.3 1.3 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
security@acronis.com 6.7 0.8 5.9
CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CWE-427 Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.