CVE-2023-45249
9.8CRITICALRemote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build
Publicado: 7/24/2024Atualizado: 10/22/2025
Vulnerabilidade Explorada Conhecida (CISA)
Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.
Ação Necessária:
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Prazo:
2024-08-19
Descrição
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
Análise IADesenvolvido por IA
Produtos Afetados
acroniscyber_infrastructure
acroniscyber_infrastructure
acroniscyber_infrastructure
acroniscyber_infrastructure
acroniscyber_infrastructure
Referências
- https://security-advisory.acronis.com/advisories/SEC-6452Vendor Advisory
- https://www.securityweek.com/acronis-product-vulnerability-exploited-in-the-wild/Press/Media Coverage
- https://security-advisory.acronis.com/advisories/SEC-6452Vendor Advisory
- https://www.securityweek.com/acronis-product-vulnerability-exploited-in-the-wild/Press/Media Coverage
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-45249Third Party AdvisoryUS Government Resource