CVE-2023-45249
CRITICAL KEV NUCLEIAcronis Cyber Infrastructure <5.0.1-61, <5.1.1-71, <5.2.1-69, <5.3....
Title source: llmDescription
Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/acronis_cyber_infra_cve_2023_45249.rb
Nuclei Templates (1)
Acronis Cyber Infrastructure - Default Password
CRITICALVERIFIEDby darses
References (3)
Scores
CVSS v3
9.8
EPSS
0.9346
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2024-07-29
VulnCheck KEV
2024-07-24
InTheWild.io
2024-07-29
ENISA EUVD
EUVD-2023-49555
CWE
CWE-1393
Status
published
Products (1)
acronis/cyber_infrastructure
< 5.0.1-61
Published
Jul 24, 2024
KEV Added
Jul 29, 2024
Tracked Since
Feb 18, 2026