CVE-2023-45249
9.8CRITICALRemote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build
Veröffentlicht: 7/24/2024Aktualisiert: 10/22/2025
CISA Bekannte Ausgenutzte Schwachstelle
Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.
Erforderliche Maßnahme:
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Fälligkeitsdatum:
2024-08-19
Beschreibung
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
KI-AnalyseKI-gestützt
Betroffene Produkte
acroniscyber_infrastructure
acroniscyber_infrastructure
acroniscyber_infrastructure
acroniscyber_infrastructure
acroniscyber_infrastructure
Referenzen
- https://security-advisory.acronis.com/advisories/SEC-6452Vendor Advisory
- https://www.securityweek.com/acronis-product-vulnerability-exploited-in-the-wild/Press/Media Coverage
- https://security-advisory.acronis.com/advisories/SEC-6452Vendor Advisory
- https://www.securityweek.com/acronis-product-vulnerability-exploited-in-the-wild/Press/Media Coverage
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-45249Third Party AdvisoryUS Government Resource