CVE-2023-45249

CRITICAL KEV NUCLEI

Acronis Cyber Infrastructure <5.0.1-61, <5.1.1-71, <5.2.1-69, <5.3....

Title source: llm

Description

Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.

Exploits (1)

metasploit WORKING POC EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/acronis_cyber_infra_cve_2023_45249.rb

Nuclei Templates (1)

Acronis Cyber Infrastructure - Default Password
CRITICALVERIFIEDby darses

Scores

CVSS v3 9.8
EPSS 0.9346
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2024-07-29
VulnCheck KEV 2024-07-24
InTheWild.io 2024-07-29
ENISA EUVD EUVD-2023-49555
CWE
CWE-1393
Status published
Products (1)
acronis/cyber_infrastructure < 5.0.1-61
Published Jul 24, 2024
KEV Added Jul 29, 2024
Tracked Since Feb 18, 2026