# Advisory on Intel CPU Vulnerabilities

## Information disclosure in Intel processors

Intel recently disclosed multiple vulnerabilities in its computer processor microarchitecture. The vulnerabilities may allow local and authenticated attackers to access sensitive information.

The following are the vulnerabilities found in affected Intel CPU models:

| CVE ID                                                                                                                                                                                                                                                          | Summary                                                                                                |
| --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------ |
| [<mark style="color:blue;">CVE-2024-28956</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html?wapkw=CVE-2024-28956)                                                                                                    | Locally authenticated users may exfiltrate sensitive information through “Indirect Target Selection.”  |
| <p><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"><mark style="color:blue;">CVE-2024-43420</mark><br><mark style="color:blue;">CVE-2025-20623</mark><br><mark style="color:blue;">CVE-2024-45332</mark></a></p> | Locally authenticated users may exfiltrate sensitive information through “Branch Privilege Injection.” |

[<mark style="color:blue;">CVE-2024-28956</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html?wapkw=CVE-2024-28956) were reported on May 12, 2025, and [<mark style="color:blue;">CVE-2024-43420</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html), [<mark style="color:blue;">CVE-2025-20623</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html), and [<mark style="color:blue;">CVE-2024-45332</mark>](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html) on May 13, 2025. Intel has classified all vulnerabilities as having a **Medium** severity score with a CVSS score **5.6**.

## Impacted IONOS Cloud products

| Product Ranges   | Product                                                                                                                                                      | Impacted | Mitigated | Patch Status |
| ---------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------ | -------- | --------- | ------------ |
| Compute Services | [<mark style="color:blue;">Dedicated Core Servers</mark>](https://docs.ionos.com/sections-test/guides/compute-services/compute-engine/dedicated-core)        | Yes      | No        | In Progress  |
| Compute Services | [<mark style="color:blue;">vCPU Servers</mark>](https://docs.ionos.com/sections-test/guides/compute-services/compute-engine/vcpu-server)                     | Yes      | No        | In Progress  |
| Compute Services | [<mark style="color:blue;">Cubes</mark>](https://docs.ionos.com/sections-test/guides/compute-services/cubes)                                                 | Yes      | No        | In Progress  |
| Containers       | [<mark style="color:blue;">Managed Kubernetes</mark>](https://docs.ionos.com/sections-test/guides/containers/managed-kubernetes)                             | Yes      | No        | In Progress  |
| Databases        | [<mark style="color:blue;">Managed Databases</mark>](https://docs.ionos.com/sections-test/guides/databases/databases)                                        | Yes      | No        | In Progress  |
| Data Analytics   | [<mark style="color:blue;">Event Streams for Apache Kafka</mark>](https://docs.ionos.com/sections-test/guides/data-analytics/kafka)                          | Yes      | No        | In Progress  |
| Observability    | [<mark style="color:blue;">Logging Service</mark>](https://docs.ionos.com/sections-test/guides/observability/logging-service)                                | Yes      | No        | In Progress  |
| Network Services | [<mark style="color:blue;">Managed Application Load Balancer</mark>](https://docs.ionos.com/sections-test/guides/network-services/application-load-balancer) | Yes      | No        | In Progress  |
| Network Services | [<mark style="color:blue;">Managed Network Load Balancer</mark>](https://docs.ionos.com/sections-test/guides/network-services/network-load-balancer)         | Yes      | No        | In Progress  |
| Network Services | [<mark style="color:blue;">Managed NAT Gateway</mark>](https://docs.ionos.com/sections-test/guides/network-services/nat-gateway)                             | Yes      | No        | In Progress  |
| Network Services | [<mark style="color:blue;">VPN Gateway</mark>](https://docs.ionos.com/sections-test/guides/network-services/vpn-gateway)                                     | Yes      | No        | In Progress  |
| Storage & Backup | [<mark style="color:blue;">Network File Storage</mark>](https://docs.ionos.com/sections-test/guides/storage-and-backup/network-file-storage)                 | Yes      | No        | In Progress  |

## What action has IONOS Cloud taken to mitigate the severity?

IONOS Cloud is committed to the privacy and security of our customers' data. We are aware of this vulnerability and have already initiated the required steps to mitigate this vulnerability. We are also investigating the exposure and risk of this vulnerability for our customer’s products and instances.

We will provide necessary updates as we learn more.

## How can I get help?

If you have further questions or concerns about this vulnerability, contact [<mark style="color:blue;">IONOS Cloud Support</mark>](https://docs.ionos.com/cloud/support/general-information/contact-information).
