{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/114757#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\n\r\nAcronis True Image, Cyber Backup, and Cyber Protection all contain privilege escalation vulnerabilities, which can allow an unprivileged Windows user to be able to run arbitrary code with SYSTEM privileges.\r\n\r\n### Description\r\n\r\n**CVE-2020-10138**\r\n\r\nAcronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an `OPENSSLDIR` variable as a subdirectory within `C:\\jenkins_agent\\`. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted `openssl.cnf` file to achieve arbitrary code execution with SYSTEM privileges.\r\n\r\n**CVE-2020-10139**\r\n\r\nAcronis True Image 2021 includes an OpenSSL component that specifies an `OPENSSLDIR` variable as a subdirectory within `C:\\jenkins_agent\\`. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted `openssl.cnf` file to achieve arbitrary code execution with SYSTEM privileges.\r\n\r\n**CVE-2020-10140**\r\n\r\nAcronis True Image 2021 fails to properly set ACLs of the `C:\\ProgramData\\Acronis` directory. Because some privileged processes are executed from the `C:\\ProgramData\\Acronis` directory, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within `C:\\ProgramData\\Acronis`.\r\n\r\n### Impact\r\nBy placing a specially-crafted `openssl.cnf` or DLL file in a specific location, an unprivileged user may be able to execute arbitrary code with SYSTEM privileges on a Windows system with the vulnerable Acronis software installed. See [DLL Search Order Hijacking](https://attack.mitre.org/techniques/T1574/001/) for more details.\r\n\r\n### Solution\r\n#### Apply an update\r\nThese vulnerabilities are addressed in Acronis True Image 2021 build 32010 ([release notes](https://www.acronis.com/en-us/support/updates/changes.html?p=42226)), Acronis Cyber Backup 12.5 build 16363 ([release notes](https://dl.managed-protection.com/u/backup/rn/12.5/user/en-US/AcronisBackup12.5_relnotes.htm)), and Acronis Cyber Protect 15 build 24600 ([release notes](https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm)).\r\n\r\n### Acknowledgements\r\nThis vulnerability was reported by Will Dormann of the CERT/CC. Acronis also credits HackerOne researchers @adr, @mmg, @vanitas, @xnand with independently discovering and reporting the vulnerabilities.\r\n\r\nThis document was written by Will Dormann.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/114757"},{"url":"https://www.acronis.com/en-us/support/updates/changes.html?p=42226","summary":"https://www.acronis.com/en-us/support/updates/changes.html?p=42226"},{"url":"https://dl.managed-protection.com/u/backup/rn/12.5/user/en-US/AcronisBackup12.5_relnotes.htm","summary":"https://dl.managed-protection.com/u/backup/rn/12.5/user/en-US/AcronisBackup12.5_relnotes.htm"},{"url":"https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm","summary":"https://dl.managed-protection.com/u/cyberprotect/rn/15/user/en-US/AcronisCyberProtect15_relnotes.htm"},{"url":"https://attack.mitre.org/techniques/T1574/001/","summary":"https://attack.mitre.org/techniques/T1574/001/"}],"title":"Acronis backup software contains multiple privilege escalation vulnerabilities","tracking":{"current_release_date":"2020-10-12T21:40:42+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#114757","initial_release_date":"2020-10-12 20:14:37.265851+00:00","revision_history":[{"date":"2020-10-12T21:40:42+00:00","number":"1.20201012214042.4","summary":"Released on 2020-10-12T21:40:42+00:00"}],"status":"final","version":"1.20201012214042.4"}},"vulnerabilities":[{"title":"Acronis Cyber Backup and Cyber Protection are vulnerable to privilege escalation via openssl.","notes":[{"category":"summary","text":"Acronis Cyber Backup and Cyber Protection are vulnerable to privilege escalation via openssl.cnf file."}],"cve":"CVE-2020-10138","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#114757"}],"product_status":{"known_affected":["CSAFPID-17a51bde-39ef-11f1-8422-122e2785dc9f"]}},{"title":"Acronis True Image is vulnerable to privilege escalation via openssl.","notes":[{"category":"summary","text":"Acronis True Image is vulnerable to privilege escalation via openssl.cnf file."}],"cve":"CVE-2020-10139","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#114757"}],"product_status":{"known_affected":["CSAFPID-17a5a7ca-39ef-11f1-8422-122e2785dc9f"]}},{"title":"Acronis True Image fails to properly set ACLs of the C:\\ProgramData\\Acronis directory, which can allow privilege escalation.","notes":[{"category":"summary","text":"Acronis True Image fails to properly set ACLs of the C:\\ProgramData\\Acronis directory, which can allow privilege escalation."}],"cve":"CVE-2020-10140","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#114757"}],"product_status":{"known_affected":["CSAFPID-17a62808-39ef-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"Acronis Inc.","product":{"name":"Acronis Inc. Products","product_id":"CSAFPID-17a51bde-39ef-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Acronis Inc.","product":{"name":"Acronis Inc. Products","product_id":"CSAFPID-17a5a7ca-39ef-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Acronis Inc.","product":{"name":"Acronis Inc. Products","product_id":"CSAFPID-17a62808-39ef-11f1-8422-122e2785dc9f"}}]}}