{"id":166277,"date":"2024-07-29T15:16:25","date_gmt":"2024-07-29T15:16:25","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=166277"},"modified":"2024-07-29T15:17:29","modified_gmt":"2024-07-29T15:17:29","slug":"acronis-cyber-infrastructure-bug-exploited","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/166277\/hacking\/acronis-cyber-infrastructure-bug-exploited.html","title":{"rendered":"Acronis Cyber Infrastructure bug actively exploited in the wild"},"content":{"rendered":"
<\/div>\n

Acronis warns of a critical vulnerability in its Acronis Cyber Infrastructure (ACI) solution that is being actively exploited in the wild. <\/h2>\n\n\n\n

Acronis is warning of a critical vulnerability, tracked as CVE-2023-45249 (CVSS score of 9.8), in its Acronis Cyber Infrastructure (ACI) solution that is being actively exploited in the wild. <\/p>\n\n\n\n

ACI is a comprehensive IT solution designed to provide cyber protection and data management. It combines several key functionalities, including software-defined storage, software-defined networking, and advanced monitoring and management tools.<\/p>\n\n\n

\n
\"\"<\/a><\/figure><\/div>\n\n\n

The company addressed the vulnerability at the end of 2023. Remote attackers can exploit the vulnerability to execute arbitrary code, the issue is due to the use of default passwords.<\/p>\n\n\n\n

Affected products include:<\/p>\n\n\n\n