IBM QRadar SIEM Critical Vulnerabilities
Summary
CERT-Bund has issued a security advisory regarding critical vulnerabilities in IBM QRadar SIEM, versions prior to 7.5.0 UP15. These vulnerabilities, with a CVSS Base Score of 9.8, allow for remote code execution, information disclosure, denial of service, and file manipulation.
What changed
This advisory (WID-SEC-2026-0783) details critical vulnerabilities in IBM QRadar SIEM, specifically affecting versions earlier than 7.5.0 UP15. The vulnerabilities have a high CVSS Base Score of 9.8 and a Temporal Score of 8.5, enabling attackers to execute arbitrary code, disclose sensitive information, perform denial-of-service attacks, conduct cross-site scripting attacks, and manipulate files remotely. The advisory notes that mitigation measures are available.
Organizations using affected versions of IBM QRadar SIEM must urgently review and apply available patches or mitigation strategies to address these critical security flaws. Failure to do so could lead to severe security breaches, including unauthorized access and control over critical systems. The advisory was published on March 18, 2026, with an update on March 19, 2026.
What to do next
- Review IBM QRadar SIEM version for applicability (prior to 7.5.0 UP15).
- Implement available patches or mitigation strategies provided by IBM.
- Assess potential impact of exploitation and review security logs for suspicious activity.
Source document (simplified)
[WID-SEC-2026-0783] IBM QRadar SIEM: Mehrere Schwachstellen CVSS Base Score 9.8 (kritisch) CVSS Temporal Score 8.5 (hoch) Remoteangriff ja Datum 18.03.2026 Stand 19.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
Produktbeschreibung
IBM QRadar Security Information and Event Management (SIEM) bietet Unterstützung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.
Produkte
18.03.2026
- IBM QRadar SIEM <7.5.0 UP15
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um beliebigen Programmcode auszuführen, um Informationen offenzulegen, um einen Denial of Service Angriff durchzuführen, um einen Cross-Site Scripting Angriff durchzuführen, und um Dateien zu manipulieren. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.