Changeflow GovPing Data Privacy & Cybersecurity VMware Tanzu Spring Boot Actuator Vulnerabilities
Priority review Notice Amended Final

VMware Tanzu Spring Boot Actuator Vulnerabilities

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 19th, 2026
Detected March 20th, 2026
Email

Summary

CERT-Bund has issued a security advisory for VMware Tanzu Spring Boot Actuator, detailing vulnerabilities that allow remote attackers to bypass security measures. The advisory affects multiple versions of VMware Tanzu Spring Boot prior to specific patch levels and includes a high CVSS base score.

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0799) concerning multiple vulnerabilities in VMware Tanzu Spring Boot Actuator. These vulnerabilities, rated with a high CVSS base score of 8.2, allow remote, anonymous attackers to bypass security controls. The advisory specifically impacts VMware Tanzu Spring Boot versions prior to 4.0.4, 3.5.12, 3.4.15, 3.3.18, and 2.7.32, affecting operating systems including UNIX and Windows.

Organizations utilizing affected versions of VMware Tanzu Spring Boot Actuator should immediately review the advisory and apply available mitigations. This includes updating to patched versions of the software to address the security bypass vulnerabilities. Failure to do so could expose systems to remote attacks, potentially leading to unauthorized access or compromise of sensitive information. The advisory indicates that mitigation is available, emphasizing the need for prompt action.

What to do next

  1. Review CERT-Bund advisory WID-SEC-2026-0799 for affected VMware Tanzu Spring Boot versions.
  2. Apply available mitigations and update VMware Tanzu Spring Boot to patched versions.
  3. Assess systems for potential compromise if running affected versions.

Source document (simplified)

[WID-SEC-2026-0799] VMware Tanzu Spring Boot Actuator: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen CVSS Base Score 8.2 (hoch) CVSS Temporal Score 7.1 (hoch) Remoteangriff ja Datum 19.03.2026 Stand 20.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Spring Boot ist ein Framework zur Entwicklung von Java Anwendungen. Spring Boot basiert auf dem Spring Framework.

Produkte

19.03.2026
- VMware Tanzu Spring Boot <4.0.4

  • VMware Tanzu Spring Boot <3.5.12

  • VMware Tanzu Spring Boot <3.4.15

  • VMware Tanzu Spring Boot <3.3.18

  • VMware Tanzu Spring Boot <2.7.32

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in VMware Tanzu Spring Boot Actuator ausnutzen, um Sicherheitsvorkehrungen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Named provisions

Betroffene Systeme Angriff

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 19th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0799

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Vulnerability Management Software Security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software Security Vulnerability Management

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.