Remote Cmd Exec via Default Passwords in Acronis Cyber Infra (ACI) <5.4.4-132
CVE-2023-45249 Published on July 24, 2024
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
Known Exploited Vulnerability
This Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.
The following remediation steps are recommended / required by August 19, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Weakness Type
Products Associated with CVE-2023-45249
Want to know whenever a new CVE is published for Acronis Cyber Infrastructure? stack.watch will email you.
Affected Versions
Acronis Cyber Infrastructure:- Version unspecified and below 5.0.1-61 is affected.
- Version unspecified and below 5.1.1-71 is affected.
- Version unspecified and below 5.2.1-69 is affected.
- Version unspecified and below 5.3.1-53 is affected.
- Version unspecified and below 5.4.4-132 is affected.
- Before 5.0.1-61 is affected.
- Version 5.1.1 and below 5.1.1-71 is affected.
- Version 5.2.1 and below 5.2.1-69 is affected.
- Version 5.3.1 and below 5.3.1-53 is affected.
- Version 5.4.4 and below 5.4.4-132 is affected.
- Before 5.0.1-61 is affected.
- Version 5.1.1 and below 5.1.1-71 is affected.
- Version 5.2.1 and below 5.2.1-69 is affected.
- Version 5.3.1 and below 5.3.1-53 is affected.
- Version 5.4.4 and below 5.4.4-132 is affected.
- Before 5.0.1-61 is affected.
- Version 5.1.1 and below 5.1.1-71 is affected.
- Version 5.2.1 and below 5.2.1-69 is affected.
- Version 5.3.1 and below 5.3.1-53 is affected.
- Version 5.4.4 and below 5.4.4-132 is affected.
- Before 5.0.1-61 is affected.
- Version 5.1.1 and below 5.1.1-71 is affected.
- Version 5.2.1 and below 5.2.1-69 is affected.
- Version 5.3.1 and below 5.3.1-53 is affected.
- Version 5.4.4 and below 5.4.4-132 is affected.
- Before 5.0.1-61 is affected.
- Version 5.1.1 and below 5.1.1-71 is affected.
- Version 5.2.1 and below 5.2.1-69 is affected.
- Version 5.3.1 and below 5.3.1-53 is affected.
- Version 5.4.4 and below 5.4.4-132 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.