True Image 2020 Acronis True Image 2020

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Acronis True Image 2020.

By the Year

In 2026 there have been 0 vulnerabilities in Acronis True Image 2020. True Image 2020 did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 3 0.00

It may take a day or so for new True Image 2020 vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Acronis True Image 2020 Security Vulnerabilities

An issue was discovered in Acronis True Image 2020 24.5.22510
CVE-2020-9450 - May 25, 2021

An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe exposes a REST API that can be used by everyone, even unprivileged users. This API is used to communicate from the GUI to anti_ransomware_service.exe. This can be exploited to add an arbitrary malicious executable to the whitelist, or even exclude an entire drive from being monitored by anti_ransomware_service.exe.

An issue was discovered in Acronis True Image 2020 24.5.22510
CVE-2020-9451 - May 25, 2021

An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot.

An issue was discovered in Acronis True Image 2020 24.5.22510
CVE-2020-9452 - May 25, 2021

An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Acronis True Image 2020 or by Acronis? Click the Watch button to subscribe.

Acronis
Vendor

subscribe