Cybersecurity firm Acronis has warned that a critical, now-fixed, security flaw affecting its Cyber Infrastructure (ACI) products is being exploited in the wild.
This vulnerability is CVE-2023-45249 (CVSS score: 9.8) concerns a case of remote code execution resulting from the use of a default password.
This flaw affects the following versions of Acronis Cyber Infrastructure (ACI):
- < Build 5.0.1-61
- < Build 5.1.1-71
- < Build 5.2.1-69
- < Build 5.3.1-53, and
- < Build 5.4.4-132
This was addressed in versions 5.4 Update 4.2, 5.2 Update 1.3, 5.3 Update 1.3, 5.0 Update 1.4, and 5.1 Update 1.2, released in late October 2023.
At this time, there are no details known about how this vulnerability has been weaponized in real-world cyber attacks, nor the identities of the threat actors that may be exploiting it.
But in an updated advisory last week, the Switzerland-based company acknowledged reports that the vulnerability was being exploited in the wild. “This vulnerability is known to be exploited in the wild,” it said.
Users using affected versions of ACI are advised to update to the latest version to mitigate the potential threat.