CVE-2026-1713
Improper Access Control in IBM MQ Allows Privilege Escalation
Publication date: 2026-03-03
Last updated on: 2026-03-05
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | mq | From 9.3.0.0 (inc) to 9.4.5.0 (exc) |
| ibm | mq | From 9.1.0.0 (inc) to 9.1.0.34 (exc) |
| ibm | mq | From 9.2.0.0 (inc) to 9.2.0.41 (exc) |
| ibm | mq | From 9.3.0.0 (inc) to 9.3.0.37 (exc) |
| ibm | mq | From 9.4.0.0 (inc) to 9.4.0.20 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-305 | The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in IBM MQ allows unauthorized users to gain access to the SYSTEM.AUTH.DATA.QUEUE, which is a critical component related to authentication data.
It is classified as an authentication bypass vulnerability (CWE-305), meaning attackers can bypass normal authentication controls.
The vulnerability affects multiple IBM MQ versions across different platforms including Windows, AIX, Linux, and Solaris.
The CVSS v3.1 score is 5.5, indicating a moderate severity with a local attack vector, low complexity, and low privileges required, but with a high impact on integrity.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with local access and low privileges to modify or tamper with authentication data in IBM MQ, potentially compromising the integrity of the system.
Although it does not impact confidentiality or availability, the high integrity impact means unauthorized changes could disrupt authentication mechanisms or allow further unauthorized actions.
Exploitation could lead to unauthorized access or manipulation of messaging queues, affecting the reliability and trustworthiness of message processing.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability in IBM MQ (CVE-2026-1713), you should apply the specific cumulative security updates or fix packs provided by IBM for your version of IBM MQ.
- For IBM MQ 9.1 LTS, update to version 9.1.0.34.
- For IBM MQ 9.2 LTS, update to version 9.2.0.41.
- For IBM MQ 9.3 LTS, update to version 9.3.0.37.
- For IBM MQ 9.4 LTS, update to version 9.4.0.20.
- For IBM MQ 9.3 CD and 9.4 CD, upgrade to version 9.4.5.0 or later continuous delivery release.
No workarounds or alternative mitigations are provided, so applying the updates is the recommended immediate action.