Patch Now or Pay Later: Acronis Warns of Critical Security Flaw Exploited in the Wild

Acronis warned customers to patch a critical Cyber Infrastructure security flaw. The vulnerability, tracked as CVE-2023-45249, allows unauthenticated attackers to bypass authentication using default credentials. Over 20,000 service providers use Acronis Cyber Protect to secure 750,000 businesses. Admins are urged to update their servers immediately to avoid remote code execution attacks.

Pro Dashboard

Hot Take:

When Acronis says, “We’ve got your back(up),” they might mean it literally. Just make sure you patch that critical flaw before the hackers decide to party in your server room!

Key Points:

  • Acronis alerts customers about a critical flaw (CVE-2023-45249) in its Cyber Infrastructure platform.
  • The vulnerability, allowing attackers to bypass authentication, impacts multiple ACI builds.
  • Over 20,000 service providers and 750,000 businesses across 150 countries are potentially at risk.
  • The flaw was patched nine months ago, but exploits have been detected in the wild.
  • Acronis strongly advises updating to the latest build immediately to ensure security.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?