# Advisory on CVE-2023-45248

## Local privilege escalation due to DLL hijacking

On October 9, 2023, Acronis disclosed another vulnerability in its Acronis Agent for Windows. The vulnerability can be fixed by upgrading to build version 36497.

## Impacted IONOS Cloud products

| Product Ranges   | Product                                                                                                                          | Impacted | Mitigated      | Patch Status   |
| ---------------- | -------------------------------------------------------------------------------------------------------------------------------- | -------- | -------------- | -------------- |
| Storage & Backup | [<mark style="color:blue;">Backup Service</mark>](https://docs.ionos.com/sections-test/guides/storage-and-backup/backup-service) | No       | Not applicable | Not applicable |
| Storage & Backup | Acronis Agent for Windows                                                                                                        | Yes      | Yes            | Done           |

## What action has IONOS Cloud taken to mitigate the severity?

The IONOS Cloud team constantly communicates with Acronis and will soon allow customers to download the patched Windows agent. Acronis has ensured no active sign of exploitation, and IONOS Cloud customer backups do not have an impact due to this vulnerability. For more information, see [<mark style="color:blue;">Acronis Cyber Protect Cloud Agent update C23.10</mark>](https://security-advisory.acronis.com/updates/UPD-2310-1f44-6b41).

IONOS Cloud will publish the non-vulnerable versions of agents when Acronis shares the information, estimated to be by the end of November 2023.

## How can I get help?

If you have further questions or concerns about this vulnerability, contact [<mark style="color:blue;">IONOS Cloud Support</mark>](https://docs.ionos.com/cloud/support/general-information/contact-information).
