Patch now! Malicious code attacks on Acronis Cyber Infrastructure observed
The developers have closed a critical vulnerability in several updated versions of Acronis Cyber Infrastructure.
![Cubes with letters spell out "CYBERCRIME"; a Finge is turning some letters around to make it "CYBERSECURITY".](https://heise.cloudimg.io/width/610/q85.png-lossy-85.webp-lossy-85.foil1/_www-heise-de_/imgs/18/4/6/4/1/9/2/3/shutterstock_2000088929-0a598d30871d7eaa.jpeg)
(Image: Dmitry Demidovich/Shutterstock.com)
1 min. read
This article was originally published in
German
and has been automatically translated.
Attackers are currently targeting the IT security solution Acronis Cyber Infrastructure (ACI). Versions secured against this are available.
In a post, the provider warns of attacks on the"critical" vulnerability (CVE-2023-45249). Attacks should be possible from a distance and malicious code can get onto systems. The source of the problem is a default password. The extent of the attacks is currently unknown.
Acronis claims to have prepared the following editions against the attacks. All previous versions are said to be vulnerable.
- ACI build 5.0.1-61
- ACI build 5.1.1-71
- ACI build 5.2.1-69
- ACI build 5.3.1-53
- ACI build 5.4.4-132
(des)