Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-9452

EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-9452

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Acronis True Image 后置链接漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Acronis True Image是新加坡安克诺斯(Acronis)的一款著名的数据备份还原软件。该软件可用于创建驱动器和磁盘映像,并在需要干净系统时可以还原镜像。 Acronis True Image 2020 24.5.22510版本存在安全漏洞,该漏洞源于程序包含通过使用SYSTEM权限将可疑的勒索软件文件从一个目录复制到另一个目录来隔离文件的功能。由于非特权用户在隔离文件夹中具有写权限,因此可以使用硬链接控制这种特权写。这意味着无特权用户可以写覆盖任意文件夹中的任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-9452

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-9452

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-05-25 · 45 CVEs total

CVE-2021-301863S-Smart Software Solutions CODESYS Control runtime system 缓冲区错误漏洞
CVE-2021-301923S-Smart Software Solutions CODESYS V2 Web-Server 安全漏洞
CVE-2021-301933S-Smart Software Solutions CODESYS V2 Web-Server 缓冲区错误漏洞
CVE-2021-301913S-Smart Software Solutions CODESYS V2 Web-Server 安全漏洞
CVE-2021-301873S-Smart Software Solutions CODESYS Control runtime system 操作系统命令注入漏洞
CVE-2021-20096OpenOversight 跨站请求伪造漏洞
CVE-2020-9450Acronis True Image 安全漏洞
CVE-2020-9451Acronis True Image 安全漏洞
CVE-2021-33574GNU C Library 资源管理错误漏洞
CVE-2021-30189CODESYS V2 Web-Server 缓冲区错误漏洞
CVE-2021-301943S-Smart Software Solutions CODESYS V2 Web-Server 缓冲区错误漏洞
CVE-2021-301883S-Smart Software Solutions CODESYS Control runtime system 缓冲区错误漏洞
CVE-2021-301953S-Smart Software Solutions CODESYS V2 Web-Server 缓冲区错误漏洞
CVE-2021-29201多款Hewlett Packard Enterprise产品跨站脚本漏洞
CVE-2021-29202多款Hewlett Packard Enterprise产品安全漏洞
CVE-2021-29204多款Hewlett Packard Enterprise产品跨站脚本漏洞
CVE-2021-29205多款Hewlett Packard Enterprise产品跨站脚本漏洞
CVE-2021-27821OpenWrt LuCI 跨站脚本漏洞
CVE-2021-33425OpenWrt LuCI Web接口跨站脚本漏洞
CVE-2021-27823NetWave System 信息泄露漏洞

Showing top 20 of 45 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-9452

No comments yet


Leave a comment