Acronis Product Vulnerability Exploited in the Wild

Share This Post

Cybersecurity and data protection technology company Acronis last week warned that threat actors are exploiting a critical-severity vulnerability patched nine months ago.

Tracked as CVE-2023-45249 (CVSS score of 9.8), the security defect impacts Acronis Cyber Infrastructure (ACI) and allows threat actors to execute arbitrary code remotely due to the use of default passwords.

According to the company, the bug impacts ACI releases before build 5.0.1-61, build 5.1.1-71, build 5.2.1-69, build 5.3.1-53, and build 5.4.4-132.

Last year, Acronis patched the vulnerability with the release of ACI versions 5.4 update 4.2, 5.2 update 1.3, 5.3 update 1.3, 5.0 update 1.4, and 5.1 update 1.2.

“This vulnerability is known to be exploited in the wild,” Acronis noted in an advisory update last week, without providing further details on the observed attacks, but urging all customers to apply the available patches as soon as possible.

Previously Acronis Storage and Acronis Software-Defined Infrastructure (SDI), ACI is a multi-tenant, hyper-converged cyber protection platform that offers storage, compute, and virtualization capabilities to businesses and service providers.

The solution can be installed on bare-metal servers to unite them in a single cluster for easy management, scaling, and redundancy.

Given the critical importance of ACI within enterprise environments, attacks exploiting CVE-2023-45249 to compromise unpatched instances could have dire consequences for the victim organizations.

Advertisement. Scroll to continue reading.

Last year, a hacker published an archive file allegedly containing 12Gb of backup configuration data, certificate files, command logs, archives, system configurations and information logs, and scripts stolen from an Acronis customer’s account.

Related: Organizations Warned of Exploited Twilio Authy Vulnerability

Related: Recent Adobe Commerce Vulnerability Exploited in Wild

Related: Apache HugeGraph Vulnerability Exploited in Wild

Related: Windows Event Log Vulnerabilities Could Be Exploited to Blind Security Products

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.