Overview
- Description
- Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
- Source
- security@acronis.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 3.0
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Known exploits
Data from CISA
- Vulnerability name
- Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability
- Exploit added on
- Jul 29, 2024
- Exploit action due
- Aug 19, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A50BD85-127D-48B6-BEDE-00CA3BAFCBAD", "versionEndExcluding": "5.0.1-61" }, { "criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5337751-14F1-4E10-80F3-EF7ED6D4B2B1", "versionEndExcluding": "5.1.1-71", "versionStartIncluding": "5.1.1" }, { "criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29CDCE6A-0B62-4FE6-8033-0C790B81BF6A", "versionEndExcluding": "5.2.1-69", "versionStartIncluding": "5.2.1" }, { "criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6125F2EC-7736-4088-AA1F-3017713AB03E", "versionEndExcluding": "5.3.1-53", "versionStartIncluding": "5.3.1" }, { "criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC427A5A-F1D5-4DEA-A005-BC4676668571", "versionEndExcluding": "5.4.4-132", "versionStartIncluding": "5.4.4" } ], "operator": "OR" } ] } ]