Cybersecurity company Acronis is alerting that a critical security flaw in its Cyber Infrastructure (ACI) product, now patched, has been exploited in real-world situations.
The vulnerability, identified as CVE-2023-45249 (CVSS score: 9.8), involves a case of remote code execution resulting from default passwords usage.
The flaw affects the following versions of Acronis Cyber Infrastructure (ACI) –
- < build 5.0.1-61
- < build 5.1.1-71
- < build 5.2.1-69
- < build 5.3.1-53, and
- < build 5.4.4-132
It has been fixed in versions 5.4 update 4.2, 5.2 update 1.3, 5.3 update 1.3, 5.0 update 1.4, and 5.1 update 1.2 released in late October 2023.
Currently, there is no information available on the specific exploitation methods in cyber attacks, or the identity of the threat actors behind them.
However, the company based in Switzerland confirmed reports of active exploitation in a recent advisory. “This vulnerability is being exploited in real-world situations,” it stated.
Users of affected ACI versions are advised to update to the latest version to reduce potential risks.