IBM App Connect Enterprise Critical Vulnerabilities, CVSS 9.1
Summary
CERT-Bund published a critical security advisory (WID-SEC-2026-1007) warning of multiple severe vulnerabilities in IBM App Connect Enterprise with a CVSS Base Score of 9.1. The vulnerabilities allow remote attackers to bypass security controls, execute arbitrary code, perform SQL injection and XSS attacks, conduct denial of service, and disclose sensitive information. Organizations running affected versions on Linux, UNIX, Windows, or other platforms must apply mitigations immediately.
What changed
CERT-Bund disclosed multiple critical vulnerabilities (CVSS 9.1) in IBM App Connect Enterprise affecting all major operating systems including Linux, UNIX, and Windows. Attackers can exploit these flaws to bypass security controls, execute arbitrary code, perform SQL injection, execute cross-site scripting, conduct denial of service attacks, manipulate files, and disclose sensitive information. All organizations running IBM App Connect Enterprise must apply vendor-provided patches or mitigations immediately. Failure to address these vulnerabilities exposes systems to remote compromise, data breaches, and operational disruption.
What to do next
- Patch IBM App Connect Enterprise to latest secure version immediately
- Implement mitigations per IBM security bulletin until patch is applied
- Monitor for new CVE disclosures and apply patches without delay
Archived snapshot
Apr 9, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-1007] IBM App Connect Enterprise: Mehrere Schwachstellen CVSS Base Score 9.1 (kritisch) CVSS Temporal Score 7.9 (hoch) Remoteangriff ja Datum 07.04.2026 Stand 08.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
IBM App Connect Enterprise kombiniert die branchenbewährten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.
Produkte
07.04.2026
- IBM App Connect Enterprise
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in IBM App Connect Enterprise ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um einen Denial of Service Angriff durchzuführen, um Informationen offenzulegen, um Dateien zu manipulieren, um einen Cross-Site Scripting Angriff durchzuführen, um einen SQL-Injection Angriff durchzuführen, und um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.