CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

acronis

true_image

19 known vulnerabilities · sorted by CVSS score

CVE-2021-32581
HIGH8.1

Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation.

acronis / cyber_protect_cloud+10
Network
Published Aug 5, 2021
CVE-2021-32580
HIGH7.8

Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking.

acronis / true_image+3
Local
Published Aug 5, 2021
CVE-2021-44204
HIGH7.8

Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287

acronis / true_image+10
Local
Published Feb 4, 2022
CVE-2021-32576
HIGH7.8

Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 1 of 2).

acronis / true_image+3
Local
Published Aug 5, 2021
CVE-2022-24113
HIGH7.8

Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287

acronis / agent+10
Local
Published Feb 4, 2022
CVE-2021-32579
HIGH7.8

Acronis True Image prior to 2021 Update 4 for Windows and Acronis True Image prior to 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API.

acronis / true_image+8
Local
Published Aug 5, 2021
CVE-2022-24115
HIGH7.8

Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287

acronis / true_image+5
Local
Published Feb 4, 2022
CVE-2020-15495
HIGH7.8

Acronis True Image 2019 update 1 through 2020 on macOS allows local privilege escalation due to an insecure XPC service configuration.

acronis / true_image+3
Local
Published Jul 15, 2021
CVE-2020-35145
HIGH7.8

Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue.

acronis / true_image
Local
Published Jan 29, 2021
CVE-2020-10140
HIGH7.8

Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of several paths within C:\ProgramData\Acronis.

acronis / true_image
Local
Published Oct 21, 2020
CVE-2021-32577
HIGH7.8

Acronis True Image prior to 2021 Update 5 for Windows allowed local privilege escalation due to insecure folder permissions.

acronis / true_image+4
Local
Published Aug 5, 2021
CVE-2020-25736
HIGH7.8

Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration.

acronis / true_image+4
Local
Published Jul 15, 2021
CVE-2021-32578
HIGH7.8

Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2).

acronis / true_image+3
Local
Published Aug 5, 2021
CVE-2020-10139
HIGH7.8

Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.

acronis / true_image
Local
Published Oct 21, 2020
CVE-2020-15496
HIGH7.8

Acronis True Image for Mac before 2021 Update 4 allowed local privilege escalation due to insecure folder permissions.

acronis / true_image+4
Local
Published Jul 15, 2021
CVE-2021-44206
HIGH7.3

Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287

acronis / true_image+5
Local
Published Feb 4, 2022
CVE-2021-44205
HIGH7.3

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287

acronis / true_image+5
Local
Published Feb 4, 2022
CVE-2022-24114
HIGH7.0

Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287

acronis / true_image+5
Local
Published Feb 4, 2022
CVE-2020-25593
MEDIUM6.7

Acronis True Image through 2021 on macOS allows local privilege escalation from admin to root due to insecure folder permissions.

acronis / true_image
Local
Published Jul 15, 2021