We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-45249



Description

Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.

Reserved 2023-10-05 | Published 2024-07-24 | Updated 2024-08-22 | Assigner Acronis


CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA Known Exploited Vulnerability

Date added 2024-07-29 | Due date 2024-08-19

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-1393

Product status

Default status
unaffected

Any version before 5.0.1-61
affected

Default status
unaffected

Any version before 5.1.1-71
affected

Default status
unaffected

Any version before 5.2.1-69
affected

Default status
unaffected

Any version before 5.3.1-53
affected

Default status
unaffected

Any version before 5.4.4-132
affected

References

security-advisory.acronis.com/advisories/SEC-6452 (SEC-6452) vendor-advisory

www.securityweek.com/...vulnerability-exploited-in-the-wild/

cve.org (CVE-2023-45249)

nvd.nist.gov (CVE-2023-45249)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-45249

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.