CVE-2026-1014
Information Exposure via JSON Response Manipulation in IBM InfoSphere
Publication date: 2026-03-25
Last updated on: 2026-03-26
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | infosphere_information_server | From 11.7.0.0 (inc) to 11.7.1.6 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-319 | The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in IBM InfoSphere Information Server (CVE-2026-1014) involves the exposure of sensitive information through manipulation of JSON server responses, classified under CWE-319 (cleartext transmission of sensitive information).
Such exposure of sensitive information can potentially impact compliance with data protection standards and regulations like GDPR and HIPAA, which require safeguarding sensitive data against unauthorized disclosure.
However, the provided information does not explicitly discuss the direct effects on compliance with these standards or regulations.
Can you explain this vulnerability to me?
CVE-2026-1014 is a vulnerability in IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 that allows sensitive information to be exposed through manipulation of JSON server responses.
This vulnerability is classified under CWE-319, which means it involves the cleartext transmission of sensitive information.
The vulnerability can be exploited over a network with low attack complexity and requires low privileges, but no user interaction is needed.
How can this vulnerability impact me? :
The vulnerability can lead to the disclosure of sensitive information, which can compromise confidentiality.
Since the attack vector is network-based and requires low privileges, an attacker with limited access could exploit this vulnerability to gain access to sensitive data.
There is no impact on integrity or availability, but the high confidentiality impact means sensitive data could be exposed to unauthorized parties.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability CVE-2026-1014 in IBM InfoSphere Information Server, you should apply the fixes provided in APAR DT462312.
Additionally, upgrade your IBM InfoSphere Information Server to version 11.7.1.0, 11.7.1.6, or 11.7.1.6 Service Pack 2.
Currently, there are no workarounds or other mitigations available.
It is also recommended to assess the vulnerability's impact in your specific environment as the CVSS environmental score may vary.