True Image 2021 Build 39287 January 27, 2022
Acronis True Image 2021 Update 6 for Windows
What's new
- Critical support for improved security protocols for secure communication with data centers.
- Bug fixes and other improvements.
Build 39287 January 27, 2022 Release Notes
https://www.acronis.com/en-eu/support/updates/changes.html?p=42246
Can someone elaborate on what bugs this fixes?
What are the other improvements?
What is meant by "critical support for improved security protocols"? What security protocols, what has been improved and what makes it critical? Support how? Support has been added for new security protocols? Or existing support for critical security protocols have been improved?
If possible, I would like to know what this new update contains before I install it. Not all things that are new are superior than the old things at all times. This is exemplified by this very same release note:
Known issues and limitations
- [TI-172086] In the "Version chain" backup scheme, a differential backup is created instead of a full one on the second backup launch.
- [TI-173652] No error message is shown for the recovery of a USB drive backup from Acronis Cloud if the USB drive is disconnected in the process.
- [TI-196935] Cannot quarantine a downloaded malware file of a specific size with the error "Failed to add to quarantine."
- [TI-204749] Backup validation fails for a full backup if some previous backups from the chain were deleted via Windows Explorer.
- [TI-206001] Cannot quarantine malware files detected and blocked during a full antivirus scan on a mapped network drive.
I don't know if these issues existed already in the previous version, or if they are introduced only in this new version. I only know that they have not been fixed in the new version, because it clearly says so.
There is a link that leads to a page with more details.
For more information about security updates, see List of fixed security vulnerabilities of Acronis True Image.
It leads here:
https://security-advisory.acronis.com/updates/UPD-2201-f76f-838c
Description
This update contains fixes for 5 high and 1 medium severity security vulnerabilities and is recommended for all users.
More details will be published soon.
Will be published soon... that's a relief. Now I just need to sit and wait.
I mean I know what this new update doesn't fix. But can we have a list of the things it does fix? What is this? Reverse logic? Can you say something more than "bugs fixed", "other improvements", "5 high and 1 medium", and "more details will be published soon"?
I don't know about other users, but I would like to know what I'm installing. Especially now that True Image 2021 is on its last leg. I wouldn't want to install bits that reactivate Active Protection or make other unwanted changes to the software.
For how long will True Image 2021 be updated? Is this the last update?


- Anmelden, um Kommentare verfassen zu können

Hi,
I installed this update on the 28/1.
Ever since, backups don't work.
I tried to open a support ticket, but support for 2021 version has ended on 2021-12-31 which is weird. If you push a new version, you should extend support for a couple of weeks so people can contact you.
Anyway, backup fails with "Failed to lock the file"
My backup is to a mounted NAS drive.
I tested the connection and it's fine.
I also verified latest version, and it was fine.
My backup is to a tibx file.
Please advise (or at least publish how I can downgrade to the previous version)
Thanks,
Yoav
- Anmelden, um Kommentare verfassen zu können

This update for True Image 2021 is part of the plan to roll out newer versions of TLS protocol for older versions of True Image.
Some users have received an e-mail from Acronis, urging them to update their software, or else some functionalities that rely on Acronis Cloud connections will become unavailable as of February. The full discussion about that can be found at the URL below.
https://forum.acronis.com/forum/acronis-cyber-protect-home-office-forum…
Within that discussion, this KB article URL was posted.
https://kb.acronis.com/content/69830
Within that KB article, Acronis has made it clear what protocols have been been updated, and after receiving criticism they have further clarified what protocols have been improved as well as what products are unaffected by this.
In the KB article, they now write:
TLS is a cryptographic protocol that provide authentication and data encryption between different endpoints, e.g. between Acronis True Image and Acronis servers (both for storing backups in Acronis Cloud and for activation, registration and sync via internet). As of February 2022, Acronis cloud infrastructure supports TLS 1.0, TLS 1.1 and TLS 1.2 protocols.
Acronis cloud data centers are built to provide the highest levels of safety, security, and accessibility. To ensure that these standards are maintained, Acronis commits to use TLS 1.2 security protocol for network communications.
Security protocols are like software; they require continuous updates and enhancements. Which is why we are shipping free mandatory software updates to Acronis True Image (versions 2017-2021) that enable the use of TLS 1.2 in older versions of Acronis True Image, to make certain that you are protected by the strongest algorithms and ciphers.
Acronis Cyber Protect Home Office supports TLS 1.2 starting from the release version. Current enterprise and MSP Acronis solutions, such as Acronis Cyber Protect and Acronis Cyber Protect Cloud always use TLS 1.2.
They make it clear now that Acronis Cyber Protect Home Office is unaffected by this.
They have also updated the security advisory page I linked to previously, so that it now lists the advisories (bugs).
SEC-3359 – published 7 days ago
Local privilege escalation due to unrestricted loading of unsigned libraries
high severity CVE-2022-24115 @vkas-afkSEC-3316 – published 7 days ago
Local privilege escalation due to race condition on application startup
high severity CVE-2022-24114 @vkas-afkSEC-3059 – published 7 days ago
Local privilege escalation due to DLL hijacking vulnerability
high severity CVE-2021-44205 @xdanes09SEC-3058 – published 7 days ago
Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service
high severity CVE-2021-44206 @xdanes09SEC-2881 – published 7 days ago
Local privilege escalation due to excessive permissions assigned to child processes
high severity CVE-2022-24113 @penroseSEC-2355 – published 7 days ago
Local privilege escalation via named pipe due to improper access control checks
medium severity CVE-2021-44204 @xnand
Thank you Acronis! I am happy with the way you have responded. In the future, try to publish these along with the updates. Also, try not to send mass e-mails about software updates. You can use the program itself for that. Or if you must send e-mails, try to target only those users that are using the affected products to avoid unnecessary confusion. Surely, you must be able to tell who is using what product.
- Anmelden, um Kommentare verfassen zu können