CVE-2026-25852
Local Privilege Escalation in Acronis DeviceLock DLP
Publication date: 2026-04-29
Last updated on: 2026-04-29
Assigner: Acronis International GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| acronis | devicelock_dlp | to 9.0.93212 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a local privilege escalation issue caused by DLL hijacking. It affects Acronis DeviceLock DLP (Windows) versions before build 9.0.93212. DLL hijacking occurs when a malicious DLL is loaded by an application instead of the legitimate one, allowing an attacker with limited privileges to execute code with higher privileges.
How can this vulnerability impact me? :
An attacker who successfully exploits this vulnerability can escalate their privileges on the affected system. This means they could gain higher-level access than originally permitted, potentially allowing them to execute arbitrary code, modify system settings, or access sensitive information.
Can you explain this vulnerability to me?
This vulnerability is a local privilege escalation issue caused by DLL hijacking. It affects Acronis DeviceLock DLP (Windows) versions before build 9.0.93212. DLL hijacking occurs when a malicious DLL is loaded by an application instead of the legitimate one, allowing an attacker with limited access to escalate their privileges on the affected system.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability could escalate their privileges from a lower level to a higher level on the affected system. This means they could gain greater control over the system, potentially leading to unauthorized access to sensitive data, modification of system settings, or disruption of normal operations.