CVE-2025-7779
Summary
| CVE | CVE-2025-7779 |
|---|---|
| State | PUBLISHED |
| Assigner | Acronis |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2025-09-30 15:15:59 UTC |
| Updated | 2026-04-10 14:16:25 UTC |
| Description | Local privilege escalation due to insecure XPC service configuration. The following products are affected: Acronis True Image (macOS) before build 42389, Acronis True Image for SanDisk (macOS) before build 42198, Acronis True Image for Western Digital (macOS) before build 42197, Acronis True Image OEM (macOS) before build 42571. |
Risk And Classification
Primary CVSS: v3.0 8.8 HIGH from [email protected]
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS: 0.000120000 probability, percentile 0.017230000 (date 2026-04-10)
Problem Types: CWE-269 | CWE-269 CWE-269
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Secondary | 8.8 | HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
| 3.0 | CNA | CVSS | 8.8 | HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
CVSS v3.0 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
ChangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Acronis | Acronis True Image | affected unspecified 42389 semver | macOS |
| CNA | Acronis | Acronis True Image For SanDisk | affected unspecified 42198 semver | macOS |
| CNA | Acronis | Acronis True Image For Western Digital | affected unspecified 42197 semver | macOS |
| CNA | Acronis | Acronis True Image OEM | affected unspecified 42571 semver | macOS |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| security-advisory.acronis.com/advisories/SEC-8193 | [email protected] | security-advisory.acronis.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: @nullevent (https://hackerone.com/nullevent) (en)
CNA: Carlos Garrido (https://pentraze.com/vulnerability-reports) (en)
CNA: Pentraze Cyber Security (https://pentraze.com/vulnerability-reports) (en)
There are currently no legacy QID mappings associated with this CVE.