Article Details

Scrape Timestamp (UTC): 2024-07-29 16:22:11.241

Source: https://thehackernews.com/2024/07/critical-flaw-in-acronis-cyber.html

Original Article Text

Click to Toggle View

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild. Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited in the wild. The vulnerability, tracked as CVE-2023-45249 (CVSS score: 9.8), concerns a case of remote code execution that stems from the use of default passwords. The flaw impacts the following versions of Acronis Cyber Infrastructure (ACI) - It has been addressed in versions 5.4 update 4.2, 5.2 update 1.3, 5.3 update 1.3, 5.0 update 1.4, and 5.1 update 1.2 released in late October 2023. There are currently no details on how the vulnerability is being weaponized in real-world cyber attacks and the identity of the threat actors that may be exploiting it. However, the Swiss-headquartered company acknowledged reports of active exploitation in an updated advisory last week. "This vulnerability is known to be exploited in the wild," it said. Users of affected versions of ACI are recommended to update to the latest version to mitigate potential threats.

Daily Brief Summary

MALWARE // Critical Security Flaw in Acronis Software Exploited by Hackers

Acronis has reported a critical vulnerability, CVE-2023-45249, in its Cyber Infrastructure product.

The flaw, rated 9.8 on the CVSS scale, allows remote code execution due to default passwords.

Affected versions include ACI 5.4 update 4.2, and other specified updates, patched in late October 2023.

Active exploitation of this vulnerability has been confirmed, though details of the attackers remain unclear.

Users are urged to update their software immediately to mitigate potential cybersecurity threats.