CVE-2026-28712
MEDIUM
6,3
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: none
Description
AI Translation Available
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0001
Percentile
0,0th
Updated
EPSS Score Trend (Last 10 Days)
427
Uncontrolled Search Path Element
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Availability
Potential Impacts:
Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
Application
Cyber Protect by Acronis
Version Range Affected
To
17.0.41186
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://security-advisory.acronis.com/advisories/SEC-2332