Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Home/CyberSecurity News/IBM Identity and Verify Access Vulnerabilities Allow Remote
CyberSecurity News

IBM Identity and Verify Access Vulnerabilities Allow Remote

Multiple critical vulnerabilities impact IBM’s Verify Identity Access and Security Verify Access products, a recently issued security bulletin confirms. If left unpatched, these widespread...

Marcus Rodriguez
Marcus Rodriguez
April 8, 2026 2 Min Read
3 0

Multiple critical vulnerabilities impact IBM’s Verify Identity Access and Security Verify Access products, a recently issued security bulletin confirms.

If left unpatched, these widespread security flaws could allow malicious actors to access sensitive information, escalate their system privileges, or cause a complete denial-of-service of the application.

Organizations relying on these authentication platforms must take immediate action to patch their infrastructure. A standout issue in the latest security advisory revolves around how the platform handles web traffic.

Tracked as CVE-2026-2862 and CVE-2026-1491, these HTTP request smuggling flaws arise from inconsistent reverse proxy handling and carry a CVSS score of 5.3.

By exploiting this vulnerability, a remote, unauthenticated attacker can trick the proxy server into exposing internal web traffic.

Ultimately, this inconsistency allows the attacker to silently bypass security checks and gain unauthorized access to highly sensitive user data.

Critical and High-Severity Flaws

The security update also patches several other severe vulnerabilities that system administrators must prioritize:

  • CVE-2026-1188 (CVSS 9.8): A critical buffer overflow flaw in the Eclipse OMR port library.

Because the system fails to correctly calculate buffer sizes when reading processor features, an attacker can trigger a memory overflow that could lead to complete system compromise.

  • CVE-2026-1346 (CVSS 9.3): A severe flaw in the Security Verify Access Container that allows a locally authenticated user to escalate their system privileges directly to root.
  • CVE-2023-46233 (CVSS 9.1): A major weakness was found in the crypto-js library. The library defaults to SHA-1, an outdated and insecure hashing algorithm, and uses only a single iteration to set password difficulty. This severely weakens password and signature protections against brute-force attacks.
  • CVE-2026-1342 (CVSS 8.5): A vulnerability in the Container platform that lets locally authenticated users execute malicious scripts from an untrusted control sphere.
  • CVE-2026-4101 (CVSS 8.1): Under certain heavy load conditions, remote attackers could bypass existing authentication mechanisms and gain unauthorized entry into the application.
  • CVE-2026-1345 (CVSS 7.3): An OS command injection vulnerability allowing unauthenticated users to execute arbitrary commands due to improper input validation.

The bulletin also addresses CVE-2026-1343 (Server-Side Request Forgery), CVE-2025-12635 (Cross-Site Scripting), and several Java SE resource consumption vulnerabilities.

These security flaws impact IBM Verify Identity Access and IBM Security Verify Access versions 10.0 through 11.0.2, including their respective Container deployments.

Because there are no official workarounds or mitigations available to stop these attacks, IBM strongly encourages customers to apply the software fixes immediately.

System administrators should download and install IBM Verify Identity Access v11.0.2 IF1 or IBM Security Verify Access v10.0.9.1 IF1 from the official support portal.

Container users must pull the latest updated images from the container registry to ensure their environments remain secure against external threats.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Chrome Update: Google Expands Lazy Loading to Video & Audio

Next Post

0-Day Exploit Actively Attacks Adobe Reader Users Hackers Attacking

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Critical Redis Flaws Enable Remote Code Execution Attacks
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us