CVE-2026-1713
Awaiting Analysis Awaiting Analysis - Queue
Improper Access Control in IBM MQ Allows Privilege Escalation

Publication date: 2026-03-03

Last updated on: 2026-03-05

Assigner: IBM Corporation

Description
IBM MQ 9.1.0.0 through 9.1.0.33 LTS, 9.2.0.0 through 9.2.0.40 LTS, 9.3.0.0 through 9.3.0.36 LTS, 9.30.0 through 9.3.5.1 CD, 9.4.0.0 through 9.4.0.17 LTS, and 9.4.0.0 through 9.4.4.1 CD
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-03
Last Modified
2026-03-05
Generated
2026-05-07
AI Q&A
2026-03-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
ibm mq From 9.3.0.0 (inc) to 9.4.5.0 (exc)
ibm mq From 9.1.0.0 (inc) to 9.1.0.34 (exc)
ibm mq From 9.2.0.0 (inc) to 9.2.0.41 (exc)
ibm mq From 9.3.0.0 (inc) to 9.3.0.37 (exc)
ibm mq From 9.4.0.0 (inc) to 9.4.0.20 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-305 The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in IBM MQ allows unauthorized users to gain access to the SYSTEM.AUTH.DATA.QUEUE, which is a critical component related to authentication data.

It is classified as an authentication bypass vulnerability (CWE-305), meaning attackers can bypass normal authentication controls.

The vulnerability affects multiple IBM MQ versions across different platforms including Windows, AIX, Linux, and Solaris.

The CVSS v3.1 score is 5.5, indicating a moderate severity with a local attack vector, low complexity, and low privileges required, but with a high impact on integrity.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with local access and low privileges to modify or tamper with authentication data in IBM MQ, potentially compromising the integrity of the system.

Although it does not impact confidentiality or availability, the high integrity impact means unauthorized changes could disrupt authentication mechanisms or allow further unauthorized actions.

Exploitation could lead to unauthorized access or manipulation of messaging queues, affecting the reliability and trustworthiness of message processing.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate the vulnerability in IBM MQ (CVE-2026-1713), you should apply the specific cumulative security updates or fix packs provided by IBM for your version of IBM MQ.

  • For IBM MQ 9.1 LTS, update to version 9.1.0.34.
  • For IBM MQ 9.2 LTS, update to version 9.2.0.41.
  • For IBM MQ 9.3 LTS, update to version 9.3.0.37.
  • For IBM MQ 9.4 LTS, update to version 9.4.0.20.
  • For IBM MQ 9.3 CD and 9.4 CD, upgrade to version 9.4.5.0 or later continuous delivery release.

No workarounds or alternative mitigations are provided, so applying the updates is the recommended immediate action.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart