Red Hat Hardened Images RPMs, Multiple Vulnerabilities (CVSS 7.5)
Summary
CERT-Bund published security advisory WID-SEC-2026-1267 disclosing multiple vulnerabilities in Red Hat Hardened Images RPMs affecting Red Hat Enterprise Linux and SUSE Linux. The CVSS Base Score of 7.5 (High) and confirmed remote attack vector indicate serious risk; an attacker could bypass security measures, escalate privileges, disclose confidential information, manipulate data, or cause a denial-of-service condition. Mitigation measures are available, though specific CVE identifiers are not displayed in the advisory. Organisations running affected Red Hat Enterprise Linux Hardened Images should apply available patches and review their security posture accordingly.
“Ein Angreifer kann mehrere Schwachstellen in Red Hat Hardened Images RPMs ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Rechte zu erweitern, vertrauliche Informationen offenzulegen, Daten zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen.”
Organisations running Red Hat Enterprise Linux Hardened Images or SUSE Linux should treat this advisory as requiring prompt action, not merely informational. The CVSS 7.5 score and confirmed remote attack vector place it above routine severity thresholds; the breadth of possible impacts (privilege escalation, information disclosure, data manipulation, DoS) means multiple attack paths exist. Teams should verify whether their specific Hardened Images RPM versions are affected and apply patches or compensating controls accordingly.
About this source
CERT-Bund is the German federal cybersecurity agency's incident response team, run by the BSI. Their advisory feed publishes vulnerability disclosures and active exploitation warnings for software in widespread enterprise use: VPN appliances, email servers, file transfer products, ERP systems, browsers, hypervisors. Around 280 advisories a month, each with a CVSS score, affected versions, and remediation guidance. The advisories are written in German but cover the same vulnerabilities that show up in CISA, NCSC-UK, and JPCERT bulletins, often hours earlier. Watch this if you patch enterprise software, run a SOC, or write detection rules. GovPing publishes each advisory with the affected vendor, CVSS score, and original CERT-Bund link.
What changed
CERT-Bund issued advisory WID-SEC-2026-1267 describing multiple security vulnerabilities in Red Hat Hardened Images RPMs used with Red Hat Enterprise Linux and SUSE Linux. The vulnerabilities carry a CVSS Base Score of 7.5 (High) and a Temporal Score of 6.5 (Medium), with confirmed remote exploitability. Affected organisations should apply available mitigations immediately. This advisory does not specify CVE identifiers in the visible content.
Security teams managing Red Hat Enterprise Linux or SUSE Linux environments with Hardened Images RPMs should prioritise vulnerability remediation. The broad range of potential impacts — including privilege escalation, information disclosure, data manipulation, and denial-of-service — means this advisory warrants attention beyond routine monitoring. Confirm patch availability through Red Hat and SUSE channels and verify mitigation effectiveness.
Archived snapshot
Apr 27, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-1267] Red Hat Hardened Images RPMs: Mehrere Schwachstellen CVSS Base Score 7.5 (hoch) CVSS Temporal Score 6.5 (mittel) Remoteangriff ja Datum 26.04.2026 Stand 27.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Produkte
26.04.2026
- SUSE Linux
- Red Hat Enterprise Linux Hardened Images RPMs
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Red Hat Hardened Images RPMs ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Rechte zu erweitern, vertrauliche Informationen offenzulegen, Daten zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.