Sparx Enterprise Architect Multiple Vulnerabilities Allow Security Bypass
Summary
CERT-Bund issued security advisory WID-SEC-2026-1163 regarding multiple vulnerabilities in Sparx Systems Enterprise Architect (versions prior to 17.1) affecting Linux, UNIX, and Windows platforms. CVSS Base Score is 6.1 (medium) with CVSS Temporal Score of 5.3 (medium). Remote attack is not possible; mitigation is available. Attackers can exploit these vulnerabilities to bypass security measures and disclose information.
What changed
CERT-Bund published security advisory WID-SEC-2026-1163 disclosing multiple vulnerabilities in Sparx Systems Enterprise Architect affecting all platforms (Linux, UNIX, Windows) prior to version 17.1. The vulnerabilities have a CVSS Base Score of 6.1 (medium), allowing attackers to bypass security measures and disclose information. Remote attack is not possible and mitigations are available.
Organizations using Sparx Enterprise Architect should update to version 17.1 or later to address these vulnerabilities. IT security teams should monitor for available patches and apply mitigations promptly. The vulnerabilities affect any entity using this UML modeling software across development and engineering environments.
Archived snapshot
Apr 17, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-1163] Sparx Systems Enterprise Architect: Mehrere Schwachstellen CVSS Base Score 6.1 (mittel) CVSS Temporal Score 5.3 (mittel) Remoteangriff nein Datum 16.04.2026 Stand 17.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
- Windows
Produktbeschreibung
Sparx Enterprise Architect ist ein UML Modellierungswerkzeug.
Produkte
16.04.2026
- Sparx Systems Enterprise Architect <17.1
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Sparx Systems Enterprise Architect ausnutzen, um Sicherheitsvorkehrungen zu umgehen, und um Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.