# N/A
## 概述
由于默认密码的使用,导致远程命令执行漏洞。
## 影响版本
- Acronis Cyber Infrastructure (ACI) before build 5.0.1-61
- Acronis Cyber Infrastructure (ACI) before build 5.1.1-71
- Acronis Cyber Infrastructure (ACI) before build 5.2.1-69
- Acronis Cyber Infrastructure (ACI) before build 5.3.1-53
- Acronis Cyber Infrastructure (ACI) before build 5.4.4-132
## 细节
该漏洞是由默认密码所导致的,攻击者可以利用这些默认密码进行未经认证的远程命令执行。
## 影响
攻击者可以利用此漏洞在受影响的系统上执行任意命令,从而控制目标系统,造成严重的安全风险。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, 5.1.1-71, 5.2.1-69, 5.3.1-53, and 5.4.4-132 contain a remote command execution caused by use of default passwords, letting attackers execute arbitrary commands remotely, exploit requires access to the system with default credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2025/CVE-2023-45249.yaml | POC详情 |
| 2 | Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, 5.1.1-71, 5.2.1-69, 5.3.1-53, and 5.4.4-132 contain a remote command execution caused by use of default passwords, letting attackers execute arbitrary commands remotely, exploit requires access to the system with default credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2023/CVE-2023-45249.yaml | POC详情 |
标题: Acronis Product Vulnerability Exploited in the Wild - SecurityWeek -- 🔗来源链接
标签:
暂无评论