
The Download
Acronis has raised a red flag about a significant security vulnerability in its Cyber Infrastructure (ACI) product line that can bypass authentication and enable remote login by unauthenicated users using default passwords. This vulnerability, tracked as CVE-2023-45249, is being actively exploited by cybercriminals to gain unauthorized access to various systems. Default credentials, often left unchanged by users, have become a prime target for attackers looking to infiltrate networks and systems. The exploitation of these default passwords underscores a broader issue in cybersecurity: the critical need for robust password management practices to safeguard against potential breaches.
What You Can Do
To protect yourself and your organization from this vulnerability, it’s essential to take immediate action. First update your ACI products to the latest version to patch CVE-2023-45249.
Additionally, stay informed about emerging vulnerabilities and ensure your software and systems are up-to-date with the latest security patches.
ThreatMate continuously monitors your network infrastructure for vulnerabilities and will also conduct automated pen testing that test for default passwords.
To Learn More: