CVE CVE

CVE-2023-45249

CISA Known Exploited Vulnerability (KEV)

Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability

July 29, 2024

August 19, 2024

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.

Weakness Enumeration

CWE-ID CWE Name

CWE-287
Improper Authentication

CWE-1393
Use of Default Password

Known Affected Software Configurations


cpe:2.3:a:acronis:cyber_infrastructure:5.0.1-61:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.1.1-71:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.1.1:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.2.1-69:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.2.1:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.3.1:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.4.4:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.0-1906:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.1-54:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.1-59:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.2-46:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.3-16:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.3-27:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.4-63:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.5-63:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.5-64:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.5-69:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.0.5-72:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.0-812:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.1-43:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.1-45:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.1-48:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.1-51:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.2-34:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.2-35:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.2-39:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.3-18:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.3-22:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.3-25:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.4-24:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.4-26:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.4-28:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.5-25:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.5-41:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:3.5.5-47:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.0.0-734:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.0.0-737:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.0.0-741:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.0.1-44:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.0.1-48:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.0.1-49:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.0.1-52:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.0.1-55:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.0.1-57:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.5.0-284:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.5.0-289:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.5.1-23:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.5.1-31:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.5.1-42:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.5.2-10:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.6.0-208:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.6.0-209:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.6.0-213:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.6.1-42:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.6.2-10:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.6.2-22:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.7.0-230:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.7.0-234:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.7.0-237:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.7.1-29:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.7.1-35:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.7.1-36:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.7.1-50:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:4.7.1-53:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.0.0-137:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.0.0-140:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.0.1-42:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.0.1-53:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.0.1-55:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.0.1-57:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.1.0-206:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.1.1-61:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.1.1-68:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.2.0-141:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.2.1-57:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.2.1-65:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.2.1-66:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.3.0-130:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.3.0-132:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.3.1-41:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.3.1-49:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.4.4-112:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:-:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.2.0-135:*:*:*:*:*:*:*

cpe:2.3:a:acronis:cyber_infrastructure:5.2.0:*:*:*:*:*:*:*

Details

Source:
NVD
Published:
Updated:

Risk information

CVSS v3

Base score:
9.8
Severity:

CRITICAL

Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2

Not defined