We recently became aware of a security vulnerability within our Act! Pro, Act! Premium, and Act! Growth Suite software that may make it easier for a threat actor to gain unauthorized access to your system. To address this vulnerability, updates are available for supported versions of Act!. View the Act! Support Obsolescence Policy. See additional version and deployment-specific details below.
To ensure the vulnerability described above is addressed, you will need to apply the appropriate update for your supported version as soon as possible. If you are currently running Act! v21 or earlier, you will need to upgrade to Act! v24 Update 4 or above to address this issue. Customers who host or sync their software via a 3rd party hosting provider should contact that provider immediately to discuss the appropriate remedy.
Updates are being made available for Act! v24, Act! v23, and Act! v22.1*. See below for the release schedule and instructions.
To ensure the vulnerability described above is addressed, an update is required for your supported version.
Updates are being made available for Act! v24, Act! v23, and Act! v22.1*. If you are currently running a local instance of Act! v21 or earlier, you will need to upgrade to Act! v24 Update 4 to address this issue. See below for the release schedule and instructions.
To ensure the vulnerability described above is addressed, you will need to apply the appropriate update for your supported version as soon as possible. If you are currently running Act! v21 or earlier, you will need to upgrade to Act! v24 Update 4 or above to address this issue. Customers who host or sync their software via a 3rd party hosting provider should contact that provider immediately to discuss the appropriate remedy.
Pro Perpetual License Holders: Updates will be made available for Act! Pro v24 and Act! Pro v22.1*.
Premium Perpetual License Holders: Updates will be made available for Act! v24, Act! v23, and Act! v22.1*.
See below for the release schedule and instructions.
Updates are being made available for Act! v24, Act! v23 and Act! v22.1. To ensure the vulnerability described above is addressed, you will need to apply the appropriate update for your supported version as soon as possible.
Available Updates:
Note: Customers who host or sync their software via a 3rd party hosting provider should contact that provider immediately to discuss the appropriate remedy.
A vulnerability was recently identified in Act! via routine penetration testing. The Act! engineering team has reviewed, fixed and re-assessed the vulnerability with a third-party threat intelligence vendor. Updates that address this issue are being made available for Act! v24, Act! v23, and Act! v22.1*. See above for the release schedule and additional details.
No, we are not currently aware of any bad actors taking advantage of the vulnerability.
Per the Act! Support Obsolescence Policy, updates are being made available for supported versions of Act!*.
To ensure that this vulnerability is addressed, an update for your supported version is required*. See above for the remedy specific to your version and deployment method. If you are currently running Act! v21 or earlier, you will need to upgrade to Act! v24 Update 4 to address this issue. Customers who host or sync their software via a 3rd party hosting provider should contact that provider immediately to discuss the appropriate remedy.
To find the version of Act! you’re currently on, go to Help > About Act! in the top navigation of Act!.