Changeflow GovPing Data Privacy & Cybersecurity IBM App Connect Enterprise Critical Vulnerabili...
Urgent Notice Added Final

IBM App Connect Enterprise Critical Vulnerabilities, CVSS 10.0

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued critical vulnerability advisory WID-SEC-2026-1157 for IBM App Connect Enterprise. Multiple versions including Certified Container <12.0 LTS, <12.0.12.24, <12.21.0, and <13.0.7.0 contain flaws with CVSS Base Score 10.0 and Temporal Score 8.7. Attackers can exploit these vulnerabilities to execute arbitrary code, bypass security controls, perform cross-site scripting, and manipulate data.

What changed

CERT-Bund published advisory WID-SEC-2026-1157 disclosing critical vulnerabilities in IBM App Connect Enterprise. The vulnerabilities affect multiple product versions across Certified Container and traditional deployment models with CVSS scores reaching 10.0 (critical). An attacker can exploit these flaws remotely to execute arbitrary code, bypass security mechanisms, conduct cross-site scripting attacks, and manipulate data.

Organizations using IBM App Connect Enterprise versions prior to 12.0.12.24, 12.21.0, or 13.0.7.0 face significant risk of remote system compromise. Affected platforms include UNIX, Windows, and other operating systems. Security teams should immediately identify vulnerable installations, apply available patches or mitigations from IBM, and monitor for exploitation attempts.

What to do next

  1. Apply available mitigations or vendor updates immediately
  2. Review CVE references for affected product versions
  3. Monitor for indicators of compromise

Archived snapshot

Apr 16, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1157] IBM App Connect Enterprise: Mehrere Schwachstellen CVSS Base Score 10.0 (kritisch) CVSS Temporal Score 8.7 (hoch) Remoteangriff ja Datum 15.04.2026 Stand 16.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

IBM App Connect Enterprise kombiniert die branchenbewährten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.

Produkte

15.04.2026
- IBM App Connect Enterprise Certified Container <12.0 LTS

  • IBM App Connect Enterprise <13.0.7.0

  • IBM App Connect Enterprise <12.0.12.24

  • IBM App Connect Enterprise Certified Container <12.21.0

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in IBM App Connect Enterprise ausnutzen, um beliebigen Programmcode auszuführen, Sicherheitsmaßnahmen zu umgehen, Cross-Site-Scripting durchzuführen und Daten zu manipulieren. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 15th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-1157

Who this affects

Applies to
Technology companies
Industry sector
3341 Computer & Electronics Manufacturing
Activity scope
Vulnerability management Patch management Security advisory response
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Data Privacy Consumer Protection

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!