Acronis Cyber Infrastructure Flaw Exploited in the Wild

Acronis warns of a critical security flaw in its Cyber Infrastructure (ACI) product that has been exploited by attackers.

The cybersecurity company Acronis has issued a warning about a critical security flaw affecting its Cyber Infrastructure (ACI) product that has been exploited in the wild. The vulnerability, tracked as CVE-2023-45249 and assigned a CVSS score of 9.8, allows for remote code execution and stems from the use of default passwords.

The flaw impacts the following versions of Acronis Cyber Infrastructure (ACI):

Build 5.0.1-61 and earlier

Build 5.1.1-71 and earlier

Build 5.2.1-69 and earlier

Build 5.3.1-53 and earlier

Build 5.4.4-132 and earlier

The vulnerability has been addressed in versions 5.4 update 4.2, 5.2 update 1.3, 5.3 update 1.3, 5.0 update 1.4, and 5.1 update 1.2, which were released in late October 2023.

Acronis acknowledged reports of active exploitation in an updated advisory last week, stating that "This vulnerability is known to be exploited in the wild." While details about the specific threat actors exploiting the flaw and their methods remain scarce, the urgency of the situation highlights the importance of immediate action for affected users.

Users of the affected ACI versions are strongly advised to update to the latest version as soon as possible to mitigate potential threats.

Staying informed about security vulnerabilities and promptly updating software is crucial for protecting systems from potential attacks. Users are encouraged to follow official security advisories and keep their software up-to-date to maintain optimal security posture.