Changeflow GovPing Data Privacy & Cybersecurity IBM Tivoli Network Manager Critical Vulnerabili...
Urgent Guidance Added Final

IBM Tivoli Network Manager Critical Vulnerabilities CVSS 9.8

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund disclosed multiple critical vulnerabilities in IBM Tivoli Network Manager IP Edition below version 4.2.0.24 affecting Linux, UNIX, and Windows platforms. The vulnerabilities carry a CVSS Base Score of 9.8 (critical) and enable remote attackers to execute arbitrary code, conduct denial of service attacks, disclose information, and bypass security mechanisms. Mitigation measures are available.

What changed

CERT-Bund issued a security advisory disclosing multiple critical vulnerabilities in IBM Tivoli Network Manager IP Edition prior to version 4.2.0.24. The vulnerabilities, with CVSS Base Score 9.8 and Temporal Score 8.5, affect all supported operating systems (Linux, UNIX, Windows) and enable remote attackers to execute arbitrary code, conduct denial of service attacks, disclose sensitive information, and circumvent security controls.

Organizations using IBM Tivoli Network Manager should immediately identify affected installations and apply available patches or mitigations. Given the critical severity and remote attack vector, unpatched instances pose significant risk of compromise and should be prioritized for remediation. The software is used for Layer-2 and Layer-3 network data collection and distribution in complex network environments.

What to do next

  1. Identify instances of IBM Tivoli Network Manager IP Edition below version 4.2.0.24
  2. Apply available patches or mitigations to affected systems
  3. Monitor for signs of exploitation

Archived snapshot

Apr 11, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1032] IBM Tivoli Network Manager: Mehrere Schwachstellen CVSS Base Score 9.8 (kritisch) CVSS Temporal Score 8.5 (hoch) Remoteangriff ja Datum 08.04.2026 Stand 09.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX
  • Windows

Produktbeschreibung

IBM Tivoli Network Manager ist eine Netzanalysesoftware für das Management komplexer Netze. Diese Software erfasst und verteilt Layer-2- und Layer-3-Netzdaten.

Produkte

08.04.2026
- IBM Tivoli Network Manager IP Edition <4.2.0.24

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in IBM Tivoli Network Manager ausnutzen, um beliebigen Programmcode auszuführen, um einen Denial of Service Angriff durchzuführen, um Informationen offenzulegen, und um Sicherheitsvorkehrungen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Named provisions

Affected Systems Product Description Attack Vector Mitigation

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 8th, 2026
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-1032

Who this affects

Applies to
Technology companies Government agencies Telecommunications firms
Industry sector
5112 Software & Technology
Activity scope
Vulnerability disclosure Network management software Security patch management
Threshold
IBM Tivoli Network Manager IP Edition < 4.2.0.24
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Telecommunications Data Privacy

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!