IBM threat watch

IBM product CVE coverage for enterprise software, middleware, security tooling, cloud services, and infrastructure components.

Vendor watch hub

What this page covers

The IBMwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent IBM activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

19

Active

7

Featured

9

Unique CVEs

19

Most recent entry

Apr 30, 2026, 5:16 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent IBM watch items

Showing the 19 most recent items, newest first. Each row links to the official advisory.

19 rows · sorted newest first

Operations view

i vulnerability (CVE-2026-2311)

CRITICAL
watchNVDCVE-2026-2311

IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 s vulnerable to privilege escalation caused by an invalid IBM i Web Administration GUI authorization check.  A malicious actor could cause user-controlled code to run with administrator privilege.

Apr 30, 2026, 5:16 PMOfficial source

security verify access vulnerability (CVE-2026-1346)

HIGH
watchNVDCVE-2026-1346

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to escalate their privileges to root due to execution with unnecessary privileges than required.

Apr 7, 2026, 8:16 PMOfficial source

security verify access vulnerability (CVE-2026-1343)

HIGH
watchNVDCVE-2026-1343

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 allows an attacker to contact internal authentication endpoints which are protected by the Reverse Proxy.

Apr 7, 2026, 8:16 PMOfficial source

security verify access vulnerability (CVE-2026-1342)

HIGH
watchNVDCVE-2026-1342

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.

Apr 7, 2026, 7:16 PMOfficial source

security verify access vulnerability (CVE-2026-4101)

CRITICAL
watchNVDCVE-2026-4101

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 under certain load conditions could allow an attacker to bypass authentication mechanisms and gain unauthorized access to the application.

Apr 1, 2026, 4:17 PMOfficial source

security verify access vulnerability (CVE-2026-1345)

HIGH
watchNVDCVE-2026-1345

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow an unauthenticated user to execute arbitrary commands as lower user privileges on the system due to improper validation of user supplied input.

Apr 1, 2026, 4:16 PMOfficial source

IBM Aspera Faspex Code Execution Vulnerability

critical
activeCISA KEVCVE-2022-47986

IBM Aspera Faspex could allow a remote attacker to execute code on the system, caused by a YAML deserialization flaw. Known ransomware use: Known.

Feb 20, 2023, 6:00 PMOfficial source

IBM InfoSphere BigInsights Invalid Input Vulnerability

critical
activeCISA KEVCVE-2013-3993

Certain APIs within BigInsights can take invalid input that might allow attackers unauthorized access to read, write, modify, or delete data. Known ransomware use: Known.

May 24, 2022, 7:00 PMOfficial source

IBM Data Risk Manager Security Bypass Vulnerability

critical
activeCISA KEVCVE-2020-4427

IBM Data Risk Manager contains a security bypass vulnerability that could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system.

Nov 2, 2021, 7:00 PMOfficial source

IBM Planning Analytics Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2019-4716

IBM Planning Analytics is vulnerable to a configuration overwrite that allows an unauthenticated user to login as "admin", and then execute code as root or SYSTEM via TM1 scripting.

Nov 2, 2021, 7:00 PMOfficial source

IBM Data Risk Manager Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2020-4428

IBM Data Risk Manager contains an unspecified vulnerability which could allow a remote, authenticated attacker to execute commands on the system.�

Nov 2, 2021, 7:00 PMOfficial source

IBM Data Risk Manager Directory Traversal Vulnerability

critical
activeCISA KEVCVE-2020-4430

IBM Data Risk Manager contains a directory traversal vulnerability that could allow a remote authenticated attacker to traverse directories and send a specially crafted URL request to download arbitrary files from the system.

Nov 2, 2021, 7:00 PMOfficial source

sterling b2b integrator vulnerability (CVE-2015-7450)

CRITICAL
activeCISA KEVCVE-2015-7450

Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.

Jan 2, 2016, 3:59 PMOfficial source

rational build forge vulnerability (CVE-2008-2122)

HIGH
watchNVDCVE-2008-2122

IBM Rational Build Forge 7.0.2 allows remote attackers to cause a denial of service (CPU consumption) via a port scan, which spawns multiple bfagent server processes that attempt to read data from closed sockets.

May 9, 2008, 10:20 AMOfficial source

lotus domino vulnerability (CVE-2007-5544)

HIGH
watchNVDCVE-2007-5544

IBM Lotus Notes before 6.5.6, and 7.x before 7.0.3; and Domino before 6.5.5 FP3, and 7.x before 7.0.2 FP1; uses weak permissions (Everyone:Full Control) for memory mapped files (shared memory) in IPC, which allows local users to obtain sensitive information, or inject Lotus Script or other character sequences into a session.

Oct 29, 2007, 4:46 PMOfficial source

tivoli provisioning manager os deployment vulnerability (CVE-2007-3268)

HIGH
watchNVDCVE-2007-3268

The TFTP implementation in IBM Tivoli Provisioning Manager for OS Deployment 5.1 before Fix Pack 3 allows remote attackers to cause a denial of service (rembo.exe crash and multiple service outage) via a read (RRQ) request with an invalid blksize (blocksize), which triggers a divide-by-zero error.

Jul 18, 2007, 6:30 PMOfficial source

db2 universal database vulnerability (CVE-2005-4868)

HIGH
watchNVDCVE-2005-4868

Shared memory sections and events in IBM DB2 8.1 have default permissions of read and write for the Everyone group, which allows local users to gain unauthorized access, gain sensitive information, such as cleartext passwords, and cause a denial of service.

Dec 30, 2005, 11:00 PMOfficial source

u2 universe vulnerability (CVE-2003-0578)

HIGH
watchNVDCVE-2003-0578

cci_dir in IBM U2 UniVerse 10.0.0.9 and earlier creates hard links and unlinks files as root, which allows local users to gain privileges by deleting and overwriting arbitrary files.

Aug 17, 2003, 11:00 PMOfficial source

websphere application server vulnerability (CVE-2000-0497)

HIGH
watchNVDCVE-2000-0497

IBM WebSphere server 3.0.2 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case.

Jun 7, 2000, 11:00 PMOfficial source

Related vendors

Other cloud vendors in the radar

Vendor watch FAQ

Common questions

What is the IBM threat watch page?

It is the IBM-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the IBM watch page?

Use it to confirm whether current IBM issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to IBM security issues?

Yes. ITECS can help map IBM advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.