Acronis Urges Users to Patch 9-Month-Old Security Flaw Being Exploited in the Wild
Swiss cybersecurity experts Acronis are urging users to patch a nine-month-old vulnerability in Acronis Cyber Infrastructure (ACI) that’s now actively being abused. The flaw, CVE-2023-45249, allows remote command execution via default passwords and carries a critical severity score of 9.8. Don’t let your servers become…

Hot Take:
Someone give Acronis a calendar! They’re urging customers to patch a flaw they discovered nine months ago. That’s like warning someone about wet paint after they’ve already sat on the bench!
Key Points:
- Acronis is urging customers to apply a patch issued nine months ago.
- The vulnerability, CVE-2023-45249, allows remote command execution due to default passwords.
- The flaw has a severity score of 9.8 (critical) according to the NVD.
- Multiple versions of Acronis Cyber Infrastructure (ACI) are affected.
- Over 20,000 service providers using ACI are at risk, protecting more than 750,000 organizations in 150 countries.
Membership Required
You must be a member to access this content.