{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T18:06:53.790576800Z","vulnerabilities":[{"cve":{"id":"CVE-2023-41743","sourceIdentifier":"security@acronis.com","published":"2023-08-31T16:15:10.270","lastModified":"2026-04-10T14:16:23.543","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Cyber Protect Cloud Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979, Acronis True Image OEM (Windows) before build 42575."},{"lang":"es","value":"Escalada de privilegios locales debido a permisos inseguros del puerto de comunicación del conductor. Los siguientes productos se ven afectados: Acronis Cyber ??Protect Home Office (Windows) antes de la compilación 40278, Acronis Agent (Windows) antes de la compilación 31637, Acronis Cyber ??Protect 15 (Windows) antes de la compilación 35979."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"security@acronis.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":6.0}]},"weaknesses":[{"source":"security@acronis.com","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*","versionEndExcluding":"c23.02","matchCriteriaId":"6F4ABAEF-E87F-40CF-B8DA-5E70F9A480B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*","matchCriteriaId":"89899D10-1343-4276-919A-9C1DF2DB8B55"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*","matchCriteriaId":"A77B2499-B3A4-4278-BA0D-59AB59C60352"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*","matchCriteriaId":"BAF6A576-C320-4550-B7F8-4FCAE82FB06A"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*","matchCriteriaId":"9740A956-D589-4846-8717-B6182EB65F8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*","matchCriteriaId":"9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*","matchCriteriaId":"69506F27-DEF8-4317-9E54-D79CA430AD4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*","matchCriteriaId":"8418AF63-E280-4CE2-8E5C-DCD00ABE6557"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect_home_office:39900:*:*:*:*:*:*:*","matchCriteriaId":"E0894339-A1AD-4382-A4B0-C13FEDE1F076"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect_home_office:40107:*:*:*:*:*:*:*","matchCriteriaId":"6DE560C6-2EC0-4C58-AA31-B15512F45877"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect_home_office:40173:*:*:*:*:*:*:*","matchCriteriaId":"E47F65B4-ACD6-4507-9242-35530163A730"},{"vulnerable":true,"criteria":"cpe:2.3:a:acronis:cyber_protect_home_office:40208:*:*:*:*:*:*:*","matchCriteriaId":"EE9F5E36-F752-4C7C-A678-D5B596A71C67"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://security-advisory.acronis.com/SEC-4858","source":"security@acronis.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://security-advisory.acronis.com/advisories/SEC-5487","source":"security@acronis.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://security-advisory.acronis.com/SEC-4858","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://security-advisory.acronis.com/advisories/SEC-5487","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]}]}}]}