CVE-2026-27774
DLL Hijacking in Acronis True Image Enables Local Privilege Escalation
Publication date: 2026-04-02
Last updated on: 2026-04-20
Assigner: Acronis International GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| acronis | true_image | to 2026 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a local privilege escalation issue caused by DLL hijacking. It affects Acronis True Image (Windows) versions before build 42902. An attacker with limited privileges could exploit this flaw by tricking the application into loading a malicious DLL, thereby gaining higher privileges on the affected system.
How can this vulnerability impact me? :
Exploitation of this vulnerability can allow an attacker with limited access to escalate their privileges to a higher level, potentially gaining full control over the affected system. This can lead to unauthorized access, modification, or deletion of sensitive data, and compromise of system integrity.