- Description
- Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.
- Source
- security@acronis.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 3.0
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability
- Exploit added on
- Jul 29, 2024
- Exploit action due
- Aug 19, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1A50BD85-127D-48B6-BEDE-00CA3BAFCBAD",
"versionEndExcluding": "5.0.1-61"
},
{
"criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E5337751-14F1-4E10-80F3-EF7ED6D4B2B1",
"versionEndExcluding": "5.1.1-71",
"versionStartIncluding": "5.1.1"
},
{
"criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "29CDCE6A-0B62-4FE6-8033-0C790B81BF6A",
"versionEndExcluding": "5.2.1-69",
"versionStartIncluding": "5.2.1"
},
{
"criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6125F2EC-7736-4088-AA1F-3017713AB03E",
"versionEndExcluding": "5.3.1-53",
"versionStartIncluding": "5.3.1"
},
{
"criteria": "cpe:2.3:a:acronis:cyber_infrastructure:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EC427A5A-F1D5-4DEA-A005-BC4676668571",
"versionEndExcluding": "5.4.4-132",
"versionStartIncluding": "5.4.4"
}
],
"operator": "OR"
}
]
}
]