Changeflow GovPing Data Privacy & Cybersecurity OpenCTI Remote Code Execution Vulnerability - C...
Urgent Guidance Added Final

OpenCTI Remote Code Execution Vulnerability - CVSS 9.1 Critical

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued a critical security advisory for OpenCTI (an open-source cyber threat intelligence platform), disclosing a remote code execution vulnerability with CVSS Base Score 9.1. The flaw affects all versions prior to 6.9.5 on Linux and UNIX systems, allowing authenticated remote attackers to execute arbitrary code. Mitigation measures are available.

What changed

CERT-Bund published a critical security advisory (WID-SEC-2026-1036) disclosing a remote code execution vulnerability in OpenCTI, an open-source cyber threat intelligence management platform. The vulnerability carries a CVSS Base Score of 9.1 (critical) and a Temporal Score of 7.9 (high), with confirmed remote attack capability. All Linux and UNIX-based installations running OpenCTI versions prior to 6.9.5 are affected.

Organizations operating OpenCTI for threat intelligence management face immediate risk of unauthorized system compromise. Security teams should prioritize patch deployment to version 6.9.5 or later, implement network segmentation as a compensating control, and monitor for indicators of exploitation. Given the critical CVSS score and remote execution capability, unpatched instances represent a severe attack surface.

What to do next

  1. Immediately identify all OpenCTI instances running versions below 6.9.5
  2. Apply available patches or mitigations from OpenCTI to version 6.9.5 or later
  3. Audit access logs for signs of exploitation given the critical severity

Archived snapshot

Apr 9, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1036] OpenCTI: Schwachstelle ermöglicht Codeausführung CVSS Base Score 9.1 (kritisch) CVSS Temporal Score 7.9 (hoch) Remoteangriff ja Datum 08.04.2026 Stand 09.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX

Produktbeschreibung

OpenCTI ist eine Open-Source-Plattform für Organisationen zur Verwaltung ihres Wissens und ihrer Beobachtungen im Bereich Cyber Threat Intelligence.

Produkte

08.04.2026
- Open Source OpenCTI <6.9.5

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in OpenCTI ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from BSI.

What's AI-generated?

The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.

Last updated

Classification

Agency
BSI
Published
April 8th, 2026
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-1036

Who this affects

Applies to
Technology companies Government agencies Organizations using open-source platforms
Industry sector
5112 Software & Technology
Activity scope
Vulnerability disclosure Patch management Security advisory
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Information Security

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.