Changeflow GovPing Data Privacy & Cybersecurity OpenCTI Vulnerability Allows Bypassing Security...
Priority review Notice Amended Final

OpenCTI Vulnerability Allows Bypassing Security Measures

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 16th, 2026
Detected March 17th, 2026
Email

Summary

CERT-Bund has issued a security advisory for OpenCTI, a cyber threat intelligence platform. A vulnerability (CVE) allows remote, authenticated attackers to bypass security measures. The advisory affects OpenCTI versions prior to 6.9.1.

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0746) detailing a vulnerability in OpenCTI, an open-source platform used for managing cyber threat intelligence. The vulnerability, with a CVSS Base Score of 6.5, allows remote, authenticated attackers to bypass security measures. This affects versions of OpenCTI prior to 6.9.1, running on Linux and UNIX operating systems.

Organizations utilizing OpenCTI should update to version 6.9.1 or later to mitigate this risk. Failure to update could expose systems to unauthorized access and compromise of sensitive threat intelligence data. While no specific compliance deadline is mentioned, prompt patching is strongly advised to prevent exploitation.

What to do next

  1. Update OpenCTI to version 6.9.1 or later.
  2. Review system logs for any signs of exploitation.

Source document (simplified)

[WID-SEC-2026-0746] OpenCTI: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen CVSS Base Score 6.5 (mittel) CVSS Temporal Score 5.7 (mittel) Remoteangriff ja Datum 16.03.2026 Stand 17.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX

Produktbeschreibung

OpenCTI ist eine Open-Source-Plattform für Organisationen zur Verwaltung ihres Wissens und ihrer Beobachtungen im Bereich Cyber Threat Intelligence.

Produkte

16.03.2026
- Open Source OpenCTI <6.9.1

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in OpenCTI ausnutzen, um Sicherheitsvorkehrungen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 16th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies
Geographic scope
de

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Vulnerability Management Threat Intelligence

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.