Vulnerability Description
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Acronis | Cyber Infrastructure | < 5.0.1-61 |
Related Weaknesses (CWE)
References
- https://security-advisory.acronis.com/advisories/SEC-6452Vendor Advisory
- https://www.securityweek.com/acronis-product-vulnerability-exploited-in-the-wildPress/Media Coverage
- https://security-advisory.acronis.com/advisories/SEC-6452Vendor Advisory
- https://www.securityweek.com/acronis-product-vulnerability-exploited-in-the-wildPress/Media Coverage
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2023-45249?
CVE-2023-45249 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build...
How severe is CVE-2023-45249?
CVE-2023-45249 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-45249?
Check the references section above for vendor advisories and patch information. Affected products include: Acronis Cyber Infrastructure.