Acronis DLP, Cyber Protect Agent Vulnerable to Local Privilege Escalation (CVE-2026-41220)
The National Vulnerability Database has detailed CVE-2026-41220, a critical flaw in Acronis DeviceLock DLP and Acronis Cyber Protect Cloud Agent for Windows. This vulnerability stems from improper input validation, allowing local attackers to escalate privileges on compromised systems. The affected builds are prior to version 9.0.93212 for DeviceLock DLP and build 42183 for Cyber Protect Cloud Agent.
This flaw carries a CVSS score of 7.8, classifying it as HIGH severity. Attackers who can already execute code or access a system locally can leverage this to gain administrative control. This bypasses standard user restrictions, potentially enabling deeper system compromise, data exfiltration, or further lateral movement within a network. Defenders must prioritize patching these Acronis products to mitigate this risk.
What This Means For You
- If your organization uses Acronis DeviceLock DLP or Acronis Cyber Protect Cloud Agent on Windows, immediately verify your build versions. Patch to build 9.0.93212 or later for DeviceLock DLP, and 42183 or later for Cyber Protect Cloud Agent, to close this privilege escalation vector.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41220 - Acronis Privilege Escalation via Improper Input Validation
title: CVE-2026-41220 - Acronis Privilege Escalation via Improper Input Validation
id: scw-2026-04-29-ai-1
status: experimental
level: critical
description: |
Detects the execution of potentially vulnerable Acronis DeviceLock DLP or Acronis Cyber Protect Agent executables. This rule specifically targets the binaries identified as affected by CVE-2026-41220, which allows for local privilege escalation due to improper input validation.
author: SCW Feed Engine (AI-generated)
date: 2026-04-29
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41220/
tags:
- attack.privilege_escalation
- attack.t1068
logsource:
category: process_creation
detection:
selection:
Image|endswith:
- 'DeviceLock64.exe'
- 'CyberProtectAgent.exe'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41220 | Vulnerability | CVE-2026-41220 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 29, 2026 at 18:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.