IBM SPSS Multiple Vulnerabilities Advisory
Summary
CERT-Bund has issued a security advisory for IBM SPSS, detailing multiple vulnerabilities with a CVSS score of 8.2. These vulnerabilities allow for remote attacks, including cross-site scripting and denial of service. Affected systems include Linux, UNIX, and Windows.
What changed
CERT-Bund has released advisory WID-SEC-2026-0752 concerning critical vulnerabilities in IBM SPSS versions prior to 9.0.0.0 IF002. The vulnerabilities, rated with a high CVSS Base Score of 8.2, enable remote attackers to conduct cross-site scripting (XSS) attacks, execute denial-of-service (DoS) attacks, and manipulate files. The advisory applies to Linux, UNIX, and Windows operating systems.
Organizations utilizing affected IBM SPSS versions should implement mitigation strategies as outlined by CERT-Bund and IBM to address these security risks. While a specific compliance deadline is not provided, prompt patching or applying vendor-recommended workarounds is crucial to prevent potential exploitation and data compromise. Failure to address these vulnerabilities could lead to significant operational disruption and security breaches.
What to do next
- Review IBM SPSS installations for versions prior to 9.0.0.0 IF002.
- Implement vendor-provided patches or mitigation strategies to address identified vulnerabilities.
- Assess potential impact of vulnerabilities on data integrity and system availability.
Source document (simplified)
[WID-SEC-2026-0752] IBM SPSS: Mehrere Schwachstellen CVSS Base Score 8.2 (hoch) CVSS Temporal Score 7.1 (hoch) Remoteangriff ja Datum 16.03.2026 Stand 17.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
- Windows
Produktbeschreibung
IBM SPSS ist ein umfassendes Set von Daten- und prognostischen Analyse-Tools für Geschäftsbenutzer, Analysten und Statistik-Programmierer.
Produkte
16.03.2026
- IBM SPSS <9.0.0.0 IF002
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in IBM SPSS ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen, um einen Denial of Service Angriff durchzuführen, und um Dateien zu manipulieren. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.