# Advisory on CVE-2023-45248

## Local privilege escalation due to DLL hijacking

On October 9, 2023, Acronis disclosed another vulnerability in its Acronis Agent for Windows. The vulnerability can be fixed by upgrading to build version 36497.

## Impacted IONOS Cloud products

| Product Ranges   | Product                                                                                        | Impacted | Mitigated      | Patch Status   |
| ---------------- | ---------------------------------------------------------------------------------------------- | -------- | -------------- | -------------- |
| Backup & Storage | [<mark style="color:blue;">Backup Service</mark>](/cloud/backup-and-storage/backup-service.md) | No       | Not applicable | Not applicable |
| Backup & Storage | Acronis Agent for Windows                                                                      | Yes      | Yes            | Done           |

## What action has IONOS Cloud taken to mitigate the severity?

The IONOS Cloud team constantly communicates with Acronis and will soon allow customers to download the patched Windows agent. Acronis has ensured no active sign of exploitation, and IONOS Cloud customer backups do not have an impact due to this vulnerability. For more information, see [<mark style="color:blue;">Acronis Cyber Protect Cloud Agent update C23.10</mark>](https://security-advisory.acronis.com/updates/UPD-2310-1f44-6b41).

IONOS Cloud will publish the non-vulnerable versions of agents when Acronis shares the information, estimated to be by the end of November 2023.

## How can I get help?

If you have further questions or concerns about this vulnerability, contact [<mark style="color:blue;">IONOS Cloud Support</mark>](https://docs.ionos.com/cloud/support/general-information/contact-information).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.ionos.com/cloud/security-safeguards/vulnerability-register/2023/cve-2023-45248.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
