# Vulnerability Register

The Vulnerability Register reports security vulnerabilities affecting IONOS Cloud products and services. The information provided is part of an ongoing effort to help you manage security risks and protect your systems.

| **CVE ID**                                                                                                                                                                 | **CVSS Base Score** | **Severity** | **Is Patch Available** | **Patch Deployed on and Status** | **Patch Responsibility** |
| -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | :-----------------: | :----------: | :--------------------: | :------------------------------: | :----------------------: |
| [<mark style="color:blue;">CVE-2025-14847</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2025/cve-2025-14847)              |         8.7         |     High     |           Yes          |    December 19, 2025 and Done    |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2025-40300</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2025/cpu-vulnerabilities-vmscape) |         6.5         |    Medium    |           Yes          |      September 2025 and Done     |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2025-20623</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2025/intel-cpu-vulnerabilities)   |         5.6         |    Medium    |           Yes          |              Planned             |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2024-10220</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/cve-2024-10220)              |         8.1         |     High     |           Yes          |          Not Applicable          |           User           |
| [<mark style="color:blue;">CVE-2024-9264</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/cve-2024-9264)                |         9.9         |   Critical   |     Not Applicable     |          Not Applicable          |      Not Applicable      |
| [<mark style="color:blue;">CVE-2024-9486</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/cve-2024-9486)                |         9.8         |   Critical   |           Yes          |     October 15, 2024 and Done    |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2024-47177</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/linux-cups-vulnerabilities)  |         9.0         |   Critical   |           Yes          |          Not Applicable          |      Not Applicable      |
| [<mark style="color:blue;">CVE-2024-31449</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/redis-vulnerabilities)       |         8.8         |     High     |           Yes          |     October 7, 2024 and Done     |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2024-6387</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/cve-2024-6387)                |         8.1         |   Critical   |           Yes          |       July 2, 2024 and Done      |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2024-4323</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/cve-2024-4323)                |         9.8         |   Critical   |     Not Applicable     |          Not Applicable          |      Not Applicable      |
| [<mark style="color:blue;">CVE-2024-34010</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/acronis-vulnerabilities)     |         8.2         |     High     |           Yes          |      June 11, 2024 and Done      |          Acronis         |
| [<mark style="color:blue;">CVE-2024-3094</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/cve-2024-3094)                |          10         |   Critical   |     Not Applicable     |          Not Applicable          |      Not Applicable      |
| [<mark style="color:blue;">CVE-2024-21626</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2024/cve-2024-21626)              |         8.6         |     High     |           Yes          |     February 5, 2024 and Done    |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2023-23583</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2023/cve-2023-23583)              |         8.8         |     High     |           Yes          |    November 16, 2023 and Done    |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2023-20569</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2023/cve-2023-20569)              |         4.7         |    Medium    |           Yes          |     October 13, 2023 and Done    |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2023-45248</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2023/cve-2023-45248)              |         6.6         |    Medium    |           Yes          |     November 9, 2023 and Done    |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2023-45247</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2023/cve-2023-45247)              |         7.1         |     High     |           Yes          |     November 9, 2023 and Done    |        IONOS Cloud       |
| [<mark style="color:blue;">CVE-2022-40982</mark>](https://docs.ionos.com/sections-test/guides/security-safeguards/vulnerability-register/2023/cve-2022-40982)              |         6.5         |    Medium    |           Yes          |     August 14, 2023 and Done     |        IONOS Cloud       |

{% hint style="warning" %}
**Disclaimer:** You will leave our site by clicking on external links. We do not have control over the content or availability of the linked websites, nor do we endorse or guarantee their accuracy, relevance, or completeness. We are not responsible for any issues from accessing or using these external websites, and we recommend reviewing the terms and privacy policies.
{% endhint %}

We highly recommend using the [<mark style="color:blue;">National Institute of Standards and Technology (NIST)</mark>](https://nvd.nist.gov/) public vulnerability database as an invaluable resource for your security efforts. The NIST public vulnerability database provides comprehensive information on known vulnerabilities, including detailed descriptions, severity ratings, and mitigation strategies.

For third-party dependant assets and services provided by IONOS Cloud, we recommend that you closely monitor the below external resources for the latest security-related information.

| **Product**        |          **Asset**          |                                                                                                                                     **Vulnerability Register**                                                                                                                                    |
| ------------------ | :-------------------------: | :-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: |
| Images & Snapshots |        Windows Images       |                                                                                            [<mark style="color:blue;">Microsoft Security Update Guide</mark>](https://msrc.microsoft.com/update-guide/)                                                                                           |
| Images & Snapshots |        Ubuntu Images        |                                                                                                      [<mark style="color:blue;">Ubuntu CVE Reports</mark>](https://ubuntu.com/security/cves)                                                                                                      |
| Images & Snapshots |        Debian Images        |                                                                                                  [<mark style="color:blue;">Debian Security Bug Tracker</mark>](https://www.debian.org/security/)                                                                                                 |
| Images & Snapshots |       AlmaLinux Images      |                                                                                                         [<mark style="color:blue;">AlmaLinux Errata</mark>](https://errata.almalinux.org/)                                                                                                        |
| Images & Snapshots |      Rocky Linux Images     |                                                                                                       [<mark style="color:blue;">Rocky Linux Errata</mark>](https://errata.rockylinux.org/)                                                                                                       |
| Images & Snapshots |         RHEL Images         | [<mark style="color:blue;">Red Hat Security Advisories</mark>](https://access.redhat.com/security/security-updates/security-advisories?q=\&p=1\&sort=portal_publication_date+desc\&rows=10\&portal_advisory_type=Security+Advisory\&documentKind=Errata\&portal_product=Red+Hat+Enterprise+Linux) |
| Images & Snapshots |        ClearOS Images       |                                                                                                                                      ClearCenter CVE Database                                                                                                                                     |
| Images & Snapshots | Microsoft SQL Server Images |                                                                                            [<mark style="color:blue;">Microsoft Security Update Guide</mark>](https://msrc.microsoft.com/update-guide/)                                                                                           |
| Managed Kubernetes |     Kubernetes resources    |                                                                              [<mark style="color:blue;">Kubernetes Official CVE Feed</mark>](https://kubernetes.io/docs/reference/issues-security/official-cve-feed/)                                                                             |
| Backup Service     |         Backup Agent        |                                                                                           [<mark style="color:blue;">Acronis Advisory Database</mark>](https://security-advisory.acronis.com/advisories)                                                                                          |
| PostgreSQL         |     PostgreSQL resources    |                                                                                          [<mark style="color:blue;">PostgreSQL Security Information</mark>](https://www.postgresql.org/support/security/)                                                                                         |
| MongoDB            |      MongoDB resources      |                                                                                                         [<mark style="color:blue;">MongoDB Alerts</mark>](https://www.mongodb.com/alerts)                                                                                                         |

To stay informed about the latest security vulnerabilities affecting various software, operating systems, and network components, regularly monitoring and referencing the above resources are crucial. By doing so, you can proactively assess and address potential security risks within your infrastructure.
