# Advisory on CVE-2024-9264

On October 18, 2024, Grafana Labs disclosed a vulnerability introduced in Grafana 11 that may allow attackers to execute arbitrary code on affected systems, potentially leading to complete system compromise.

This vulnerability is assigned the CVE ID [<mark style="color:blue;">CVE-2024-9264</mark>](https://nvd.nist.gov/vuln/detail/CVE-2024-9264) and classified as **Critical** severity with a CVSS score of **9.9**. For more information about the technical details of the vulnerability, refer to Grafana's [<mark style="color:blue;">official advisory</mark>](https://grafana.com/blog/2024/10/17/grafana-security-release-critical-severity-fix-for-cve-2024-9264/).

## Impacted IONOS Cloud Products

| Product Ranges         | Product                                                                                           | Impacted | Mitigated      | Patch Status   |
| ---------------------- | ------------------------------------------------------------------------------------------------- | -------- | -------------- | -------------- |
| Observability Products | [<mark style="color:blue;">Logging as-a Service</mark>](/cloud/observability/logging-service.md)  | No       | Not Applicable | Not Applicable |
| Observability Products | [<mark style="color:blue;">Monitoring Service</mark>](/cloud/observability/monitoring-service.md) | No       | Not Applicable | Not Applicable |

## Risk on IONOS Cloud environment

IONOS Cloud infrastructure and services do not utilize the vulnerable version of Grafana, so they are not impacted.

## What action can you take to mitigate the vulnerability?

If you are using custom images, we advise you to refer to the information provided by the Operating System (OS) vendor to address any concerns from this reported issue.

## How can I get help?

If you have further questions or concerns about this vulnerability, contact [<mark style="color:blue;">IONOS Cloud Support</mark>](https://docs.ionos.com/cloud/support/general-information/contact-information).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.ionos.com/cloud/security-safeguards/vulnerability-register/2024/cve-2024-9264.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
