# Advisory on Intel CPU Vulnerabilities

## Information disclosure in Intel processors

Intel recently disclosed multiple vulnerabilities in its computer processor microarchitecture. The vulnerabilities may allow local and authenticated attackers to access sensitive information.

The following are the vulnerabilities found in affected Intel CPU models:

| CVE ID                                                                                                                                                                                                                                                          | Summary                                                                                                |
| --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------ |
| [<mark style="color:blue;">CVE-2024-28956</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html?wapkw=CVE-2024-28956)                                                                                                    | Locally authenticated users may exfiltrate sensitive information through “Indirect Target Selection.”  |
| <p><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"><mark style="color:blue;">CVE-2024-43420</mark><br><mark style="color:blue;">CVE-2025-20623</mark><br><mark style="color:blue;">CVE-2024-45332</mark></a></p> | Locally authenticated users may exfiltrate sensitive information through “Branch Privilege Injection.” |

[<mark style="color:blue;">CVE-2024-28956</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html?wapkw=CVE-2024-28956) were reported on May 12, 2025, and [<mark style="color:blue;">CVE-2024-43420</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html), [<mark style="color:blue;">CVE-2025-20623</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html), and [<mark style="color:blue;">CVE-2024-45332</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html) on May 13, 2025. Intel has classified all vulnerabilities as having a **Medium** severity score with a CVSS score **5.6**.

## Impacted IONOS Cloud products

| Product Ranges   | Product                                                                                                                    | Impacted | Mitigated | Patch Status |
| ---------------- | -------------------------------------------------------------------------------------------------------------------------- | -------- | --------- | ------------ |
| Compute Services | [<mark style="color:blue;">Dedicated Core Servers</mark>](/cloud/compute-services/compute-engine/dedicated-core.md)        | Yes      | No        | In Progress  |
| Compute Services | [<mark style="color:blue;">vCPU Servers</mark>](/cloud/compute-services/compute-engine/vcpu-server.md)                     | Yes      | No        | In Progress  |
| Compute Services | [<mark style="color:blue;">Cubes</mark>](/cloud/compute-services/cubes.md)                                                 | Yes      | No        | In Progress  |
| Containers       | [<mark style="color:blue;">Managed Kubernetes</mark>](/cloud/containers/managed-kubernetes.md)                             | Yes      | No        | In Progress  |
| Databases        | [<mark style="color:blue;">Managed Databases</mark>](/cloud/databases/databases.md)                                        | Yes      | No        | In Progress  |
| Data Analytics   | [<mark style="color:blue;">Event Streams for Apache Kafka</mark>](/cloud/data-analytics/kafka.md)                          | Yes      | No        | In Progress  |
| Observability    | [<mark style="color:blue;">Logging Service</mark>](/cloud/observability/logging-service.md)                                | Yes      | No        | In Progress  |
| Network Services | [<mark style="color:blue;">Managed Application Load Balancer</mark>](/cloud/network-services/application-load-balancer.md) | Yes      | No        | In Progress  |
| Network Services | [<mark style="color:blue;">Managed Network Load Balancer</mark>](/cloud/network-services/network-load-balancer.md)         | Yes      | No        | In Progress  |
| Network Services | [<mark style="color:blue;">Managed NAT Gateway</mark>](/cloud/network-services/nat-gateway.md)                             | Yes      | No        | In Progress  |
| Network Services | [<mark style="color:blue;">VPN Gateway</mark>](/cloud/network-services/vpn-gateway.md)                                     | Yes      | No        | In Progress  |
| Backup & Storage | [<mark style="color:blue;">Network File Storage</mark>](/cloud/backup-and-storage/network-file-storage.md)                 | Yes      | No        | In Progress  |

## What action has IONOS Cloud taken to mitigate the severity?

IONOS Cloud is committed to the privacy and security of our customers' data. We are aware of this vulnerability and have already initiated the required steps to mitigate this vulnerability. We are also investigating the exposure and risk of this vulnerability for our customer’s products and instances.

We will provide necessary updates as we learn more.

## How can I get help?

If you have further questions or concerns about this vulnerability, contact [<mark style="color:blue;">IONOS Cloud Support</mark>](https://docs.ionos.com/cloud/support/general-information/contact-information).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.ionos.com/cloud/security-safeguards/vulnerability-register/2025/intel-cpu-vulnerabilities.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
