Arbitrary Code Execution in Acronis True Image Due to OpenSSL Misconfiguration
CVE-2020-10139

7.8HIGH

Key Information:

Vendor
Acronis
Vendor
CVE Published:
21 October 2020

Summary

Acronis True Image 2021 incorporates an OpenSSL component with a misconfigured OPENSSLDIR variable that points to a subdirectory within C:\jenkins_agent. The software contains a privileged service that utilizes this OpenSSL component. Because standard Windows users can create subdirectories off the system root, an unprivileged user could potentially craft a specially-designed openssl.cnf file within the specified directory, enabling them to execute arbitrary code with SYSTEM-level privileges. This vulnerability poses a significant risk as it allows unauthorized users to manipulate system operations and gain control over critical system resources.

Affected Version(s)

True Image 2021 < 32010

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Will Dormann
.