Vulnerability Register

The Vulnerability Register reports security vulnerabilities affecting IONOS Cloud products and services. The information provided is part of an ongoing effort to help you manage security risks and protect your systems.

CVE IDCVSS Base ScoreSeverityIs Patch AvailablePatch Deployed on and StatusPatch Responsibility

9.0

Critical

Yes

Not Applicable

Not Applicable

8.8

High

Yes

October 7, 2024 and Done

IONOS Cloud

8.1

Critical

Yes

July 2, 2024 and In Progress

IONOS Cloud

9.8

Critical

Not Applicable

Not Applicable

Not Applicable

8.2

High

Yes

May 6, 2024 and In Progress

Acronis

10

Critical

Not Applicable

Not Applicable

Not Applicable

8.6

High

Yes

February 5, 2024

IONOS Cloud

8.8

High

Yes

November 16, 2023

IONOS Cloud

9.8

Critical

Yes

November 6, 2023

IONOS Cloud

4.7

Medium

Yes

October 13, 2023 and Ongoing

IONOS Cloud

6.6

Medium

No

IONOS Cloud

7.1

High

No

IONOS Cloud

6.5

Medium

Yes

August 14, 2023

IONOS Cloud

Disclaimer: You will leave our site by clicking on external links. We do not have control over the content or availability of the linked websites, nor do we endorse or guarantee their accuracy, relevance, or completeness. We are not responsible for any issues from accessing or using these external websites, and we recommend reviewing the terms and privacy policies.

We highly recommend using the National Institute of Standards and Technology (NIST) public vulnerability database as an invaluable resource for your security efforts. The NIST public vulnerability database provides comprehensive information on known vulnerabilities, including detailed descriptions, severity ratings, and mitigation strategies.

For third-party dependant assets and services provided by IONOS Cloud, we recommend that you closely monitor the below external resources for the latest security-related information.

ProductAssetVulnerability Register

Images & Snapshots

Windows Images

Images & Snapshots

Ubuntu Images

Images & Snapshots

Debian Images

Images & Snapshots

AlmaLinux Images

Images & Snapshots

Rocky Linux Images

Images & Snapshots

RHEL Images

Images & Snapshots

ClearOS Images

Images & Snapshots

Microsoft SQL Server Images

Managed Kubernetes

Kubernetes resources

Backup Service

Backup Agent

PostgreSQL

PostgreSQL resources

MongoDB

MongoDB resources

To stay informed about the latest security vulnerabilities affecting various software, operating systems, and network components, regularly monitoring and referencing the above resources are crucial. By doing so, you can proactively assess and address potential security risks within your infrastructure.

Last updated