First published: Wed Sep 27 2023(Updated: )
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Credit: security@acronis.com security@acronis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Acronis Cyber Protect | <15 | |
Acronis Cyber Protect | =15 | |
Acronis Cyber Protect | =15-update1 | |
Acronis Cyber Protect | =15-update2 | |
Acronis Cyber Protect | =15-update3 | |
Acronis Cyber Protect | =15-update4 | |
Acronis Cyber Protect | =15-update5 | |
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-44161.
The severity level of CVE-2023-44161 is medium with a value of 6.5.
Acronis Cyber Protect 15 (Linux, Windows) before build 35979 is affected by CVE-2023-44161.
To fix CVE-2023-44161, upgrade Acronis Cyber Protect 15 to build 35979 or later.
No, Linux Kernel and Microsoft Windows are not affected by CVE-2023-44161.