An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe keeps a log in a folder where unprivileged users have write permissions. The logs are generated in a predictable pattern, allowing an unprivileged user to create a hardlink from a (not yet created) log file to anti_ransomware_service.exe. On reboot, this forces the anti_ransomware_service to try to write its log into its own process, crashing in a SHARING VIOLATION. This crash occurs on every reboot.
References
Link Resource
https://danishcyberdefence.dk/blog Third Party Advisory
https://madsjoensen.dk/cve-2020-9451/ Exploit Third Party Advisory
https://www.acronis.com Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2021-05-25T11:01:41

Updated: 2021-05-25T11:01:41

Reserved: 2020-02-28T00:00:00


Link: CVE-2020-9451

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-05-25T12:15:07.797

Modified: 2021-06-03T14:05:10.747


Link: CVE-2020-9451

JSON object: View

cve-icon Redhat Information

No data.

CWE