IBM Semeru Runtime Critical Vulnerability - Arbitrary Code Execution
Summary
CERT-Bund issued a critical security advisory (WID-SEC-2026-0929) warning of a vulnerability in IBM Semeru Runtime and IBM DB2. The vulnerability has a CVSS Base Score of 9.8 (critical) and CVSS Temporal Score of 8.5 (high). A remote, anonymous attacker can exploit this flaw to execute arbitrary code. Affected versions: IBM Semeru Runtime prior to 21.0.10.0 and IBM DB2 version 12.1.4. Mitigation measures are available.
What changed
CERT-Bund published security advisory WID-SEC-2026-0929 disclosing a critical vulnerability in IBM Semeru Runtime (versions below 21.0.10.0) and IBM DB2 (version 12.1.4). The vulnerability carries a CVSS Base Score of 9.8 and enables remote, unauthenticated code execution. The affected products run on Linux, UNIX, Windows, and other operating systems.
Organizations using IBM Semeru Runtime or IBM DB2 must immediately check their environments for these affected versions and apply available patches or mitigations. Given the critical severity and remote exploitability, this vulnerability should be treated as a high-priority remediation item. No specific compliance deadline is stated in the advisory, but immediate action is warranted.
What to do next
- Identify systems running IBM Semeru Runtime or IBM DB2 in your environment
- Update IBM Semeru Runtime to version 21.0.10.0 or later
- Apply available patches or mitigations for affected IBM DB2 installations
Source document (simplified)
[WID-SEC-2026-0929] IBM Semeru Runtime: Schwachstelle ermöglicht Codeausführung CVSS Base Score 9.8 (kritisch) CVSS Temporal Score 8.5 (hoch) Remoteangriff ja Datum 30.03.2026 Stand 31.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
IBM Semeru Runtime ist ein Java Runtime Environment.
IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.
Produkte
30.03.2026
- IBM Semeru Runtime <21.0.10.0
- IBM DB2 = 12.1.4
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Semeru Runtime und IBM DB2 ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.