Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24830: CWE-426 in Acronis Acronis Cyber Protect Cloud Agent

0
Medium
VulnerabilityCVE-2025-24830cvecve-2025-24830cwe-426
Published: Fri Jan 31 2025 (01/31/2025, 12:43:13 UTC)
Source: CVE
Vendor/Project: Acronis
Product: Acronis Cyber Protect Cloud Agent

Description

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:54:58 UTC

Technical Analysis

CVE-2025-24830 is a local privilege escalation vulnerability identified in the Acronis Cyber Protect Cloud Agent for Windows platforms prior to build 39378. The root cause is DLL hijacking (CWE-426), where the application improperly loads dynamic link libraries (DLLs) from untrusted or user-controllable locations. This allows an attacker with limited local access to place a malicious DLL that the agent will load, thereby executing arbitrary code with elevated privileges. The vulnerability does not require user interaction and can be exploited by a local attacker with low privileges, making it a significant risk in environments where local access is possible. The CVSS 3.0 vector (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) reflects that the attack requires local access and high attack complexity, but results in high confidentiality and integrity impact without affecting availability. Although no public exploits have been reported, the nature of DLL hijacking vulnerabilities and the critical role of the Acronis Cyber Protect Cloud Agent in endpoint security make this a serious concern. The agent is widely used for backup, recovery, and endpoint protection in enterprise environments, increasing the potential impact of exploitation. The vulnerability was reserved on January 24, 2025, and published on January 31, 2025, with no patch links currently available, indicating that remediation is pending. Organizations should monitor vendor advisories closely and prepare to deploy patches promptly.

Potential Impact

Successful exploitation of this vulnerability allows an attacker with limited local privileges to escalate their rights to a higher privilege level, potentially SYSTEM or administrative level. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, and compromise of the integrity of the protected system. Since the Acronis Cyber Protect Cloud Agent is often deployed in enterprise environments for backup and security, an attacker gaining elevated privileges could disable or tamper with backup processes, evade detection, or move laterally within the network. The confidentiality and integrity impacts are high, as attackers could access or alter protected data and system configurations. However, availability is not directly impacted by this vulnerability. The requirement for local access and high attack complexity limits the scope somewhat, but insider threats or attackers who have gained initial footholds could leverage this vulnerability to deepen their control. This poses a significant risk to organizations relying on Acronis solutions for critical data protection and endpoint security.

Mitigation Recommendations

1. Apply patches or updates from Acronis as soon as they become available to address the DLL hijacking vulnerability. 2. Until patches are released, restrict local access to systems running the Acronis Cyber Protect Cloud Agent to trusted users only. 3. Implement application whitelisting and restrict DLL loading paths using Windows Defender Application Control or similar technologies to prevent loading of unauthorized DLLs. 4. Monitor systems for unusual DLL loading behavior and audit local privilege escalations or suspicious process creations. 5. Employ endpoint detection and response (EDR) solutions capable of detecting DLL hijacking attempts and privilege escalation activities. 6. Educate system administrators and users about the risks of local privilege escalation and enforce the principle of least privilege to minimize potential attack surfaces. 7. Regularly review and harden system configurations to reduce the risk of DLL hijacking, such as avoiding use of relative paths for DLL loading and ensuring secure directory permissions. 8. Maintain comprehensive logging and alerting for local privilege escalation attempts to enable rapid incident response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Acronis
Date Reserved
2025-01-24T21:09:13.771Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf164a

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 2/26/2026, 11:54:58 PM

Last updated: 3/24/2026, 9:23:03 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses