Acronis has revealed a critical vulnerability in Acronis Cyber Infrastructure (Aci) which, despite being already fixed, has become the target of active hacker exploitation according to reports.
The vulnerability, identified as cve-2023-45249 and rated at 9.8 on the CVSS scale, allows remote code execution and is associated with the use of standard passwords.
The affected versions of ACI include those up to 5.0.1-61, 5.1.1-71, 5.2.1-69, 5.3.1-53, and 5.4.4-132.
The vulnerability was addressed in updates 5.4 Update 4.2, 5.2 Update 1.3, 5.3 Update 1.3, 5.0 Update 1.4, and 5.1 Update 1.2 released at the end of October 2023.
Although specific details about how the vulnerability is being exploited in real attacks and by whom are not currently available, Acronis has confirmed active exploitation. Users of the affected ACI versions are strongly advised to update their software promptly to mitigate potential threats.
Cybersecurity and Infrastructure Security Agency (CISA) has also included CVE-2023-45249 in the list of well-known exploited vulnerabilities (KEV) and mandated federal agencies within the Civil Executive Body (FCEB) to address this vulnerability in their systems by August 19, 2024.