Acronis DLP and Cyber Protect Agent Vulnerable to Privilege Escalation (CVE-2026-41952)
The National Vulnerability Database (NVD) has disclosed CVE-2026-41952, a critical vulnerability impacting Acronis DeviceLock DLP and Acronis Cyber Protect Cloud Agent on Windows. This flaw, stemming from improper input validation, allows for local privilege escalation. Attackers with initial low-level access can exploit this to gain administrative rights on affected systems. Versions prior to Acronis DeviceLock DLP build 9.0.93212 and Acronis Cyber Protect Cloud Agent build 42183 are confirmed to be vulnerable.
This vulnerability presents a significant risk to organizations relying on these Acronis products for data loss prevention and endpoint security. A successful exploit means an attacker can bypass security controls and potentially exfiltrate sensitive data or disrupt operations. Defenders must prioritize patching these systems to mitigate the immediate threat. The high CVSS score of 7.8 underscores the severity and exploitability of this issue.
What This Means For You
- If your organization uses Acronis DeviceLock DLP or Acronis Cyber Protect Cloud Agent, immediately verify your build versions. Patch to Acronis DeviceLock DLP build 9.0.93212 or Acronis Cyber Protect Cloud Agent build 42183 or later, and audit systems for any signs of unauthorized privilege escalation.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41952 - Acronis Privilege Escalation via Improper Input Validation
title: CVE-2026-41952 - Acronis Privilege Escalation via Improper Input Validation
id: scw-2026-04-29-ai-1
status: experimental
level: high
description: |
Detects the execution of vulnerable Acronis DeviceLock DLP or Acronis Cyber Protect Agent executables, which are known to be susceptible to privilege escalation due to improper input validation (CVE-2026-41952). This rule aims to identify potential exploitation attempts targeting these specific vulnerable binaries.
author: SCW Feed Engine (AI-generated)
date: 2026-04-29
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41952/
tags:
- attack.privilege_escalation
- attack.t1068
logsource:
category: process_creation
detection:
selection:
Image|endswith:
- 'DeviceLock.exe'
- 'CyberProtectAgent.exe'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41952 | Vulnerability | CVE-2026-41952 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 29, 2026 at 18:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.