Vulnerability Register
The Vulnerability Register reports security vulnerabilities affecting IONOS Cloud products and services. The information provided is part of an ongoing effort to help you manage security risks and protect your systems.
8.1
Critical
Yes
July 2, 2024 and In Progress
IONOS Cloud
9.8
Critical
NA
NA
NA
8.2
High
Yes
May 6, 2024 and In Progress
Acronis
10
Critical
NA
NA
NA
8.6
High
Yes
February 5, 2024
IONOS Cloud
8.8
High
Yes
November 16, 2023
IONOS Cloud
9.8
Critical
Yes
November 6, 2023
IONOS Cloud
4.7
Medium
Yes
October 13, 2023 and Ongoing
IONOS Cloud
6.6
Medium
No
IONOS Cloud
7.1
High
No
IONOS Cloud
6.5
Medium
Yes
August 14, 2023
IONOS Cloud
Disclaimer: You will leave our site by clicking on external links. We do not have control over the content or availability of the linked websites, nor do we endorse or guarantee their accuracy, relevance, or completeness. We are not responsible for any issues from accessing or using these external websites, and we recommend reviewing the terms and privacy policies.
We highly recommend using the NIST (National Institute of Standards and Technology) public vulnerability database as an invaluable resource for your security efforts. The NIST public vulnerability database provides comprehensive information on known vulnerabilities, including detailed descriptions, severity ratings, and mitigation strategies.
For third-party dependant assets and services provided by IONOS Cloud, we recommend that you closely monitor the below external resources for the latest security-related information.
Compute Engine
Images & Snapshots
Windows Images
Images & Snapshots
Ubuntu Images
Images & Snapshots
Debian Images
Images & Snapshots
AlmaLinux Images
Images & Snapshots
Rocky Linux Images
Images & Snapshots
RHEL Images
Images & Snapshots
ClearOS Images
Images & Snapshots
Microsoft SQL Server Images
Managed Services
Managed Kubernetes
Kubernetes resources
Backup Service
Backup Agent
Database as a Service
PostgreSQL resources
Database as a Service
MongoDB resources
To stay informed about the latest security vulnerabilities affecting various software, operating systems, and network components, regularly monitoring and referencing the above resources are crucial. By doing so, you can proactively assess and address potential security risks within your infrastructure.
Last updated