Article Details
Scrape Timestamp (UTC): 2024-07-26 16:43:37.551
Original Article Text
Click to Toggle View
Acronis warns of Cyber Infrastructure default password abused in attacks. Acronis warned customers to patch a critical Cyber Infrastructure security flaw that lets attackers bypass authentication on vulnerable servers using default credentials. Acronis Cyber Protect (ACI) is a unified multi-tenant platform that combines remote endpoint management, backup, and virtualization capabilities and helps run disaster recovery workloads and store enterprise backup data securely. Over 20,000 service providers use ACI to protect over 750,000 businesses across more than 150 countries, according to Acronis. Unauthenticated attackers can exploit the vulnerability (tracked as CVE-2023-45249) in low-complexity attacks that don't require user interaction to gain remote code execution on unpatched ACI servers. The CVE-2023-45249 flaw was patched nine months ago and impacts multiple products, including: Earlier this week, the company confirmed in a new security advisory that the bug has been exploited in attacks and warned admins to patch their installation as soon as possible. "This update contains fixes for 1 ctitical severity security vulnerability and should be installed immediately by all users. This vulnerability is known to be exploited in the wild," Acronis said. "Keeping the software up to date is important to maintain the security of your Acronis products. For guidelines on the availability of support and security updates, see Acronis products support lifecycle." To check if your servers are vulnerable, you can find Acronis Cyber Protect's build number by going into the Help -> About dialog box from the software's main window. To update ACI to the latest available build, you have to:
Daily Brief Summary
Acronis notified its customers about a severe vulnerability allowing attackers to bypass server authentication using default credentials.
The security flaw, identified as CVE-2023-45249, affects Acronis Cyber Protect (ACI), a platform used by over 20,000 service providers globally.
ACI combines remote management, backup, and virtualization capabilities to securely handle disaster recovery and enterprise data backups.
Despite the patch being available nine months ago, the vulnerability has been actively exploited in the wild.
Acronis recommends that customers urgently update their software installations to the latest version to mitigate risk.
Users can check the vulnerability of their systems by verifying the build number of ACI through the Help -> About section of the software.
Maintaining up-to-date software is crucial for securing Acronis products against potential cyberattacks.