{"api_version":"1","generated_at":"2026-04-11T08:44:54+00:00","cve":"CVE-2025-11178","urls":{"html":"https://cve.report/CVE-2025-11178","api":"https://cve.report/api/cve/CVE-2025-11178.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-11178","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-11178"},"summary":{"title":"CVE-2025-11178","description":"Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636, Acronis True Image for SanDisk (Windows) before build 42679, Acronis True Image OEM (Windows) before build 42575.","state":"PUBLISHED","assigner":"Acronis","published_at":"2025-09-30 15:15:47","updated_at":"2026-04-10 14:16:24"},"problem_types":["CWE-427","CWE-427 CWE-427"],"metrics":[{"version":"3.0","source":"security@acronis.com","type":"Secondary","score":"7.3","severity":"HIGH","vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","data":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.0","source":"CNA","type":"CVSS","score":"7.3","severity":"HIGH","vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","data":{"baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","version":"3.0"}}],"references":[{"url":"https://security-advisory.acronis.com/advisories/SEC-7078","name":"https://security-advisory.acronis.com/advisories/SEC-7078","refsource":"security@acronis.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-11178","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-11178","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Acronis","product":"Acronis True Image","version":"affected unspecified 42386 semver","platforms":["Windows"]},{"source":"CNA","vendor":"Acronis","product":"Acronis True Image for Western Digital","version":"affected unspecified 42636 semver","platforms":["Windows"]},{"source":"CNA","vendor":"Acronis","product":"Acronis True Image for SanDisk","version":"affected unspecified 42679 semver","platforms":["Windows"]},{"source":"CNA","vendor":"Acronis","product":"Acronis True Image OEM","version":"affected unspecified 42575 semver","platforms":["Windows"]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"@satz4797 (https://hackerone.com/satz4797)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2025","cve_id":"11178","cve":"CVE-2025-11178","epss":"0.000050000","percentile":"0.002580000","score_date":"2026-04-10","updated_at":"2026-04-11 00:00:33"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-11178","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-10-01T03:55:57.464131Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-02-26T17:47:47.868Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows"],"product":"Acronis True Image","vendor":"Acronis","versions":[{"lessThan":"42386","status":"affected","version":"unspecified","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Windows"],"product":"Acronis True Image for Western Digital","vendor":"Acronis","versions":[{"lessThan":"42636","status":"affected","version":"unspecified","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Windows"],"product":"Acronis True Image for SanDisk","vendor":"Acronis","versions":[{"lessThan":"42679","status":"affected","version":"unspecified","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Windows"],"product":"Acronis True Image OEM","vendor":"Acronis","versions":[{"lessThan":"42575","status":"affected","version":"unspecified","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"@satz4797 (https://hackerone.com/satz4797)"}],"descriptions":[{"lang":"en","value":"Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636, Acronis True Image for SanDisk (Windows) before build 42679, Acronis True Image OEM (Windows) before build 42575."}],"metrics":[{"cvssV3_0":{"baseScore":7.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","version":"3.0"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-427","description":"CWE-427","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-10T13:16:25.613Z","orgId":"73dc0fef-1c66-4a72-9d2d-0a0f4012c175","shortName":"Acronis"},"references":[{"name":"SEC-7078","tags":["vendor-advisory"],"url":"https://security-advisory.acronis.com/advisories/SEC-7078"}],"x_generator":{"engine":"cvelib 1.8.0"}}},"cveMetadata":{"assignerOrgId":"73dc0fef-1c66-4a72-9d2d-0a0f4012c175","assignerShortName":"Acronis","cveId":"CVE-2025-11178","datePublished":"2025-09-30T14:52:20.711Z","dateReserved":"2025-09-29T22:35:29.171Z","dateUpdated":"2026-04-10T13:16:25.613Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-09-30 15:15:47","lastModifiedDate":"2026-04-10 14:16:24","problem_types":["CWE-427","CWE-427 CWE-427"],"metrics":{"cvssMetricV30":[{"source":"security@acronis.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":5.9}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"11178","Ordinal":"1","Title":"CVE-2025-11178","CVE":"CVE-2025-11178","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"11178","Ordinal":"1","NoteData":"Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386, Acronis True Image for Western Digital (Windows) before build 42636, Acronis True Image for SanDisk (Windows) before build 42679, Acronis True Image OEM (Windows) before build 42575.","Type":"Description","Title":"CVE-2025-11178"}]}}}