INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Cryptocurrency CRITICAL 41m Global general Financial Services and E-commerce MEDIUM 44m Global data_breach Social Media and Communications CRITICAL 57m Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 41m Global general Financial Services and E-commerce MEDIUM 44m Global data_breach Social Media and Communications CRITICAL 57m Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 41m Global general Financial Services and E-commerce MEDIUM 44m Global data_breach Social Media and Communications CRITICAL 57m Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h
Vulnerabilities

CVE-2026-1346

Critical
CWE-250 — Weakness Type
Published: Apr 8, 2026  ·  Modified: Apr 14, 2026  ·  Source: NVD
CVSS v3
9.3
🔗 NVD Official
📄 Description (English)

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to escalate their privileges to root due to execution with unnecessary privileges than required.

🤖 AI Executive Summary

IBM Verify Identity Access Container and Security Verify Access versions 10.0-10.0.9.1 and 11.0-11.0.2 contain a privilege escalation vulnerability allowing locally authenticated users to gain root access. The vulnerability stems from unnecessary privilege execution in the application architecture.

📄 Description (Arabic)

تؤثر هذه الثغرة على حاويات وتطبيقات IBM Verify Identity Access والتحقق الآمن من الوصول عبر إصدارات متعددة. يمكن للمستخدمين المصرح لهم محليًا استغلال تنفيذ الامتيازات الزائدة للحصول على وصول جذر كامل. هذا يشكل خطرًا حرجًا على أنظمة التحكم في الهوية والوصول في المؤسسات السعودية.

🤖 ملخص تنفيذي (AI)

حاويات IBM Verify Identity Access والإصدارات 10.0-10.0.9.1 و11.0-11.0.2 تحتوي على ثغرة تصعيد امتيازات تسمح للمستخدمين المصرح لهم محليًا بالوصول إلى جذر النظام. تنشأ الثغرة من تنفيذ الامتيازات غير الضرورية في معمارية التطبيق.

🤖 AI Intelligence Analysis Analyzed: Apr 12, 2026 18:48
🇸🇦 Saudi Arabia Impact Assessment
Saudi Relevance: high
🏢 Affected Saudi Sectors
banking government telecom healthcare
🎯 MITRE ATT&CK Techniques
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
Immediately upgrade IBM Verify Identity Access Container to version 11.0.3 or later, and IBM Security Verify Access Container to version 10.0.10 or later. Apply the same version updates to non-containerized deployments. Implement principle of least privilege by restricting local user access and monitoring privilege escalation attempts. Restrict container execution contexts and disable unnecessary privileged operations.
🔧 خطوات المعالجة (العربية)
قم بترقية حاويات IBM Verify Identity Access إلى الإصدار 11.0.3 أو أحدث، وحاويات IBM Security Verify Access إلى الإصدار 10.0.10 أو أحدث فورًا. طبق نفس تحديثات الإصدار على النشرات غير المحتوية على حاويات. طبق مبدأ أقل امتياز بتقييد وصول المستخدمين المحليين ومراقبة محاولات تصعيد الامتيازات. قيد سياقات تنفيذ الحاويات وعطل العمليات الامتيازية غير الضرورية.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
AC-2 AC-3 AC-6
🔵 SAMA CSF
CC-6.1 CC-6.2 CC-7.2
🟡 ISO 27001:2022
A.9.2.1 A.9.2.5 A.9.4.3
📦 Affected Products / CPE 4 entries
ibm:security_verify_access
ibm:security_verify_access_container
ibm:verify_identity_access
ibm:verify_identity_access_container
📊 CVSS Score
9.3
/ 10.0 — Critical
📊 CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack VectorL — Low / Local
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeC — Changed
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity Critical
CVSS Score9.3
CWECWE-250
EPSS0.01%
Exploit No
Patch ✗ No
Published 2026-04-08
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-250
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.