First published: Wed Jul 24 2024(Updated: )
Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.
Credit: security@acronis.com security@acronis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Acronis Cyber Infrastructure | <5.0.1-61 | |
Acronis Cyber Infrastructure | >=5.1.1<5.1.1-71 | |
Acronis Cyber Infrastructure | >=5.2.1<5.2.1-69 | |
Acronis Cyber Infrastructure | >=5.3.1<5.3.1-53 | |
Acronis Cyber Infrastructure | >=5.4.4<5.4.4-132 | |
Acronis Cyber Infrastructure |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45249 has been classified as a critical vulnerability due to its potential for remote command execution by unauthenticated users.
To mitigate CVE-2023-45249, it is essential to change all default passwords on affected Acronis Cyber Infrastructure systems.
CVE-2023-45249 affects Acronis Cyber Infrastructure versions prior to build 5.0.1-61 and all versions up to 5.4.4-132.
CVE-2023-45249 allows attackers to execute arbitrary commands remotely due to the use of default passwords.
Yes, Acronis has released a patch for CVE-2023-45249, which users should apply immediately to secure their systems.