Changeflow GovPing Data Privacy & Cybersecurity systemd Vulnerabilities Allow Denial of Service...
Priority review Notice Amended Final

systemd Vulnerabilities Allow Denial of Service or Code Execution

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund has issued a security advisory regarding multiple vulnerabilities in systemd, a Linux system and service manager. Exploitation could lead to denial of service or code execution with administrator privileges. Affected versions include open source systemd prior to various specific release numbers.

Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-Bund has released security advisory WID-SEC-2026-0831 detailing multiple vulnerabilities in the systemd software, a critical component for Linux and UNIX-based operating systems. The vulnerabilities, with a CVSS Base Score of 6.4, can be exploited by an attacker to achieve denial of service or execute code with administrator privileges. The advisory lists numerous affected open-source systemd versions, generally those below version 260, 261, 259.2, 258.5, 258.7, 259.5, 257.11, and 257.13.

Organizations utilizing Linux or UNIX systems with affected systemd versions must prioritize patching or updating their software to mitigate these risks. The advisory indicates that mitigation is possible, and prompt action is recommended to prevent potential security breaches, including unauthorized access and system disruption. While no remote attack vector is specified, the potential for code execution with administrator rights necessitates immediate attention from IT security and system administration teams.

What to do next

  1. Update systemd to a patched version
  2. Review system logs for signs of exploitation
  3. Implement network segmentation for critical systems

Archived snapshot

Mar 24, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-0831] systemd: Mehrere Schwachstellen CVSS Base Score 6.4 (mittel) CVSS Temporal Score 5.6 (mittel) Remoteangriff nein Datum 23.03.2026 Stand 24.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX

Produktbeschreibung

Systemd ist ein System- und Dienstemanger für Linux, der kompatibel mit SysV und LSB Init Skripts ist.

Produkte

23.03.2026
- Open Source systemd <260

  • Open Source systemd <260.1

  • Open Source systemd <261

  • Open Source systemd <259.2

  • Open Source systemd <258.5

  • Open Source systemd <258.7

  • Open Source systemd <259.5

  • Open Source systemd <257.11

  • Open Source systemd <257.13

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in systemd ausnutzen, um einen Denial of Service Angriff durchzuführen oder Code mit Administratorrechten auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
March 23rd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0831

Who this affects

Applies to
Employers
Industry sector
5112 Software & Technology 9211 Government & Public Administration
Activity scope
System Administration Vulnerability Management
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF NIST 800-53
Topics
System Administration Vulnerability Management

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!