arrow-left

All pages
1 of 6

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Advisory on CVE-2022-40982

hashtag
Information disclosure in Intel processors

On August 8th, 2023, Intel disclosed a vulnerability in its recent computer processor microarchitecture. This vulnerability, known as "Gather Data Sampling (GDS)" or "Downfall", may allow an attacker to obtain sensitive information from a system. This vulnerability is assigned CVE ID as CVE-2022-40982arrow-up-right and has been given a medium severity by Intel.

hashtag
What is the vulnerability?

CVE-2022-40982 is a transient execution side-channel vulnerability that affects Intel® Core processors from the 6th Generation (Skylake) to the 11th Generation (Tiger Lake). It allows an attacker with local access to infer stale data from previously used vector registers on the same physical core. A detailed description can be found in the .

hashtag
What is the risk?

If an attacker is able to exploit this vulnerability, they could potentially exfiltrate information contained within different security contexts (i.e., other virtual machines or even the host device).

hashtag
Impacted IONOS Cloud products

Product Ranges
Product
Impacted
Mitigated
Patch Status

hashtag
What action has IONOS Cloud taken to mitigate the severity?

IONOS Cloud is committed to the privacy and security of our customers' data. We are aware of this vulnerability and have already initiated the required steps to mitigate this vulnerability. We are also investigating the exposure and risk of this vulnerability for our customer’s products and instances.

We will provide necessary updates as we learn more.

hashtag
How can I get help?

If you have further questions or concerns about this vulnerability, contact .

Yes

Yes

Done

Compute Services

Dedicated Core Servers

Yes

Yes

Done

Compute Services

vCPU Servers

Yes

Yes

Done

“Downfall: Exploiting Speculative Data Gathering” paperarrow-up-right
IONOS Cloud Supportarrow-up-right

Compute Services

Cubes

Advisory on CVE-2023-23583

hashtag
Escalation of privilege for some Intel processors

On November 14th, 2023, Intel disclosed a vulnerability in its recent computer processor microarchitecture. This vulnerability, known as Redundant REX Prefix, may allow an attacker to confuse the system, resulting in unpredictable behavior. If an attacker successfully exploits this vulnerability, they could crash or hang the target system and, in some scenarios, allow an escalation of privilege, which may allow an attacker to obtain sensitive information from the system. This vulnerability is assigned CVE ID CVE-2023-23583 and has been given a high severity of 8.8 score by Intel.

hashtag
Impacted IONOS Cloud products

Product Ranges
Product
Impacted
Mitigated
Patch Status

hashtag
What action has IONOS Cloud taken to mitigate the severity?

IONOS Cloud is committed to the privacy and security of our customers' data. We have already completed the required steps to mitigate this vulnerability by upgrading the affected systems' firmware. IONOS Cloud owns the patching responsibility, and no action is required from the customer.

hashtag
How can I get help?

If you have further questions or concerns about this vulnerability, contact .

Compute Services

Yes

Yes

Done

Compute Services

Yes

Yes

Done

IONOS Cloud Supportarrow-up-right
Dedicated Core Servers
vCPU Servers

Advisory on CVE-2023-45247

hashtag
Sensitive information disclosure and manipulation due to missing authorization

On October 9, 2023, Acronis disclosed a vulnerability in its Acronis Agent for Linux, Mac, and Windows. This vulnerability may allow an unauthorized attacker to view and manipulate antivirus and antimalware protection plans applied to a specific agent. CVE-2023-45247arrow-up-right ID has been assigned to this vulnerability and classified as having high severity.

hashtag
Impacted IONOS Cloud products

Product Ranges
Product
Impacted
Mitigated
Patch Status

hashtag
What action has IONOS Cloud taken to mitigate the severity?

IONOS and Acronis are in constant communication to gain a deeper understanding of this vulnerability and also ensure that:

  • There are no signs of active exploitation resulting from the vulnerability. For more information, see .

  • The vulnerability does not allow unauthorized access to IONOS Cloud customers’ backup data. IONOS Cloud will publish the non-vulnerable versions of agents when Acronis shares the information, estimated to be by the end of November 2023.

hashtag
How can I get help?

If you have further questions or concerns about this vulnerability, contact .

Storage & Backup

No

Not applicable

Not applicable

Storage & Backup

Acronis Agent for Windows, Linux, and Mac

Yes

Yes

Done

Acronis Cyber Protect Cloud Agent update C23.10arrow-up-right
IONOS Cloud Supportarrow-up-right
Backup Service

Advisory on CVE-2023-45248

hashtag
Local privilege escalation due to DLL hijacking

On October 9, 2023, Acronis disclosed another vulnerability in its Acronis Agent for Windows. The vulnerability can be fixed by upgrading to build version 36497.

hashtag
Impacted IONOS Cloud products

Product Ranges
Product
Impacted
Mitigated
Patch Status

hashtag
What action has IONOS Cloud taken to mitigate the severity?

The IONOS Cloud team constantly communicates with Acronis and will soon allow customers to download the patched Windows agent. Acronis has ensured no active sign of exploitation, and IONOS Cloud customer backups do not have an impact due to this vulnerability. For more information, see .

IONOS Cloud will publish the non-vulnerable versions of agents when Acronis shares the information, estimated to be by the end of November 2023.

hashtag
How can I get help?

If you have further questions or concerns about this vulnerability, contact .

Storage & Backup

No

Not applicable

Not applicable

Storage & Backup

Acronis Agent for Windows

Yes

Yes

Done

Acronis Cyber Protect Cloud Agent update C23.10arrow-up-right
IONOS Cloud Supportarrow-up-right
Backup Service

Advisory on CVE-2023-20569

hashtag
Sensitive information disclosure due to speculative side-channel attack

On August 8th, 2023, Advanced Micro Devices (AMD) disclosed a vulnerability in its recent computer processor microarchitecture. This vulnerability, known as the Return Form Procedure (RET) Speculation or Inception, may allow an attacker to obtain sensitive information from a system.

If an attacker can exploit this vulnerability, they could potentially exfiltrate information contained within different security contexts such as other Virtual Machines (VM)arrow-up-right or even the host device.

The CVE ID is assigned to this vulnerability and classified as a medium severity by AMD.

hashtag
Impacted IONOS Cloud products

Product Ranges
Product
Impacted
Mitigated
Patch Status

hashtag
What action has IONOS Cloud taken to mitigate the severity?

IONOS Cloud is committed to the privacy and security of our customers' data. We are aware of this vulnerability and have already initiated the required steps to mitigate this vulnerability. We are also investigating the exposure and risk of this vulnerability for our customer’s products and instances.

We will provide necessary updates as we learn more.

hashtag
How can I get help?

If you have further questions or concerns about this vulnerability, contact .

Yes

Yes

Done

Compute Services

Dedicated Core Servers

Yes

Yes

Done

Compute Services

vCPU Servers

Yes

Yes

Done

CVE-2023-20569arrow-up-right
IONOS Cloud Supportarrow-up-right

Compute Services

Cubes

Vulnerability Register - 2023

Here is a list of vulnerabilities detected in 2023:

chevron-right2023hashtag

The following is a list of vulnerabilities that were detected in 2023:

  • CVE-2023-23583

CVE-2023-20569
CVE-2023-45248
CVE-2023-45247
CVE-2022-40982