Patch Now or Pay Later: Acronis Warns of Critical Security Flaw Exploited in the Wild

Acronis warned customers to patch a critical Cyber Infrastructure security flaw. The vulnerability, tracked as CVE-2023-45249, allows unauthenticated attackers to bypass authentication using default credentials. Over 20,000 service providers use Acronis Cyber Protect to secure 750,000 businesses. Admins are urged to update their servers immediately…

Hot Take:

When Acronis says, “We’ve got your back(up),” they might mean it literally. Just make sure you patch that critical flaw before the hackers decide to party in your server room!

Key Points:

  • Acronis alerts customers about a critical flaw (CVE-2023-45249) in its Cyber Infrastructure platform.
  • The vulnerability, allowing attackers to bypass authentication, impacts multiple ACI builds.
  • Over 20,000 service providers and 750,000 businesses across 150 countries are potentially at risk.
  • The flaw was patched nine months ago, but exploits have been detected in the wild.
  • Acronis strongly advises updating to the latest build immediately to ensure security.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here