7.3
CVE-2025-11178
- EPSS 0.01%
- Veröffentlicht 30.09.2025 15:15:47
- Zuletzt bearbeitet 03.02.2026 23:16:05
- Quelle security@acronis.com
- CVE-Watchlists
- Unerledigt
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636, Acronis True Image for SanDisk (Windows) before build 42679.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerAcronis
≫
Produkt
Acronis True Image
Default Statusunaffected
Version <
42386
Version
unspecified
Status
affected
HerstellerAcronis
≫
Produkt
Acronis True Image for Western Digital
Default Statusunaffected
Version <
42636
Version
unspecified
Status
affected
HerstellerAcronis
≫
Produkt
Acronis True Image for SanDisk
Default Statusunaffected
Version <
42679
Version
unspecified
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.002 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@acronis.com | 7.3 | 1.3 | 5.9 |
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.