Acronis DLP and Cyber Protect Agent Vulnerable to Privilege Escalation (CVE-2026-41952)

Acronis DLP and Cyber Protect Agent Vulnerable to Privilege Escalation (CVE-2026-41952)

The National Vulnerability Database (NVD) has disclosed CVE-2026-41952, a critical vulnerability impacting Acronis DeviceLock DLP and Acronis Cyber Protect Cloud Agent on Windows. This flaw, stemming from improper input validation, allows for local privilege escalation. Attackers with initial low-level access can exploit this to gain administrative rights on affected systems. Versions prior to Acronis DeviceLock DLP build 9.0.93212 and Acronis Cyber Protect Cloud Agent build 42183 are confirmed to be vulnerable.

This vulnerability presents a significant risk to organizations relying on these Acronis products for data loss prevention and endpoint security. A successful exploit means an attacker can bypass security controls and potentially exfiltrate sensitive data or disrupt operations. Defenders must prioritize patching these systems to mitigate the immediate threat. The high CVSS score of 7.8 underscores the severity and exploitability of this issue.

What This Means For You

  • If your organization uses Acronis DeviceLock DLP or Acronis Cyber Protect Cloud Agent, immediately verify your build versions. Patch to Acronis DeviceLock DLP build 9.0.93212 or Acronis Cyber Protect Cloud Agent build 42183 or later, and audit systems for any signs of unauthorized privilege escalation.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1068 Privilege Escalation

CVE-2026-41952 - Acronis Privilege Escalation via Improper Input Validation

Sigma YAML — free preview
title: CVE-2026-41952 - Acronis Privilege Escalation via Improper Input Validation
id: scw-2026-04-29-ai-1
status: experimental
level: high
description: |
  Detects the execution of vulnerable Acronis DeviceLock DLP or Acronis Cyber Protect Agent executables, which are known to be susceptible to privilege escalation due to improper input validation (CVE-2026-41952). This rule aims to identify potential exploitation attempts targeting these specific vulnerable binaries.
author: SCW Feed Engine (AI-generated)
date: 2026-04-29
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-41952/
tags:
  - attack.privilege_escalation
  - attack.t1068
logsource:
    category: process_creation
detection:
  selection:
      Image|endswith:
          - 'DeviceLock.exe'
          - 'CyberProtectAgent.exe'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-41952 Vulnerability CVE-2026-41952
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 29, 2026 at 18:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7384 — Ezequiroga Mcp-Bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea3 Path Traversal

CVE-2026-7384 — A vulnerability was detected in ezequiroga mcp-bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea39/c630b8ab0f970614d42da8e566e9c0d15a16414c. This impacts the function search_papers of the file research_server.py. Performing a manipulation of the argument...

vulnerabilityCVEhigh-severitypath-traversalcwe-22
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 3 IOCs /⚙ 6 Sigma

CVE-2026-5161: Pardus About Suffers High-Severity Symlink Vulnerability

CVE-2026-5161 — Improper link resolution before file access ('link following') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus About allows Symlink Attack. This issue...

vulnerabilityCVEhigh-severitycwe-59
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 1 IOC /⚙ 2 Sigma

CVE-2026-5141: Pardus Software Center Vulnerability Allows Privileged Process Hijacking

CVE-2026-5141 — Improper Privilege Management, Improper Access Control, Incorrect privilege assignment vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center allows Hijacking a...

vulnerabilityCVEhigh-severityimproper-access-controlcwe-266cwe-269cwe-284
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 1 IOC /⚙ 2 Sigma