CVE-2026-28711
DLL Hijacking in Acronis Cyber Protect 17 Enables Privilege Escalation
Publication date: 2026-03-06
Last updated on: 2026-03-11
Assigner: Acronis International GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| acronis | cyber_protect | to 17.0.41186 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a local privilege escalation issue caused by DLL hijacking. It affects Acronis Cyber Protect 17 (Windows) versions before build 41186. An attacker with limited privileges on the affected system could exploit this flaw to gain higher privileges by tricking the software into loading a malicious DLL.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with limited access to escalate their privileges on the affected system. This means they could gain higher-level permissions, potentially leading to unauthorized access to sensitive data or system functions. The CVSS score indicates a moderate severity with high impact on confidentiality and integrity.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know