Changeflow GovPing Data Privacy & Cybersecurity CPython Vulnerabilities Allow File Manipulation...
Priority review Notice Amended Final

CPython Vulnerabilities Allow File Manipulation and DoS

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 16th, 2026
Detected March 17th, 2026
Email

Summary

CERT-Bund has issued a security advisory regarding multiple vulnerabilities in CPython versions prior to 3.15.0. These vulnerabilities can be exploited by authenticated remote attackers to manipulate files or cause a denial-of-service condition. The advisory provides mitigation information for affected systems.

What changed

CERT-Bund has released security advisory WID-SEC-2026-0741 detailing multiple vulnerabilities in CPython versions earlier than 3.15.0. These flaws, with a CVSS Base Score of 7.1, allow authenticated remote attackers to manipulate files or induce a denial-of-service (DoS) state. The advisory applies to UNIX and Windows operating systems.

Organizations utilizing affected CPython versions should review the provided mitigation strategies to address these security risks. While no specific compliance deadline is mentioned, prompt action is recommended to prevent potential file manipulation or service disruptions. The advisory highlights the need for timely patching and security updates for open-source software components.

What to do next

  1. Review CPython version for potential vulnerability (prior to 3.15.0)
  2. Implement mitigation strategies provided by CERT-Bund
  3. Update CPython to a patched version when available

Source document (simplified)

[WID-SEC-2026-0741] CPython: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS CVSS Base Score 7.1 (hoch) CVSS Temporal Score 6.2 (mittel) Remoteangriff ja Datum 16.03.2026 Stand 17.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Python ist eine universelle, üblicherweise interpretierte, höhere Programmiersprache.

Produkte

16.03.2026
- Open Source Python <3.15.0

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in CPython ausnutzen, um Dateien zu manipulieren oder um einen Denial-of-Service-Zustand herbeizuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 16th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Manufacturers Technology companies
Geographic scope
de

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Denial of Service File Manipulation

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.