First published: Wed Sep 27 2023(Updated: )
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Credit: security@acronis.com security@acronis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Acronis Cyber Protect | <15 | |
Acronis Cyber Protect | =15 | |
Acronis Cyber Protect | =15-update1 | |
Acronis Cyber Protect | =15-update2 | |
Acronis Cyber Protect | =15-update3 | |
Acronis Cyber Protect | =15-update4 | |
Acronis Cyber Protect | =15-update5 | |
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-44160.
The severity of CVE-2023-44160 is medium.
The following products are affected by CVE-2023-44160: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
To fix CVE-2023-44160, update Acronis Cyber Protect 15 to build 35979 or later.
You can find more information about CVE-2023-44160 at the following link: [https://security-advisory.acronis.com/advisories/SEC-4083](https://security-advisory.acronis.com/advisories/SEC-4083)