CVE-2026-1272
Security Misconfiguration in IBM Guardium Access Control Panel
Publication date: 2026-04-23
Last updated on: 2026-04-27
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | guardium_data_protection | 12.1 |
| ibm | guardium_data_protection | 12.0 |
| ibm | guardium_data_protection | 12.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-613 | According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization." |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-1272 is a Security Misconfiguration vulnerability found in IBM Guardium Data Protection versions 12.0, 12.1, and 12.2. It is related to insufficient session expiration in the user access control panel, meaning that sessions may not properly expire as intended.
This vulnerability is classified under CWE-613 (Insufficient Session Expiration) and has a CVSS 3.1 base score of 2.7, indicating a low severity issue that requires high privileges to exploit and does not impact confidentiality or availability but has a low impact on integrity.
How can this vulnerability impact me? :
The vulnerability could allow an attacker with high privileges to exploit the insufficient session expiration in the user access control panel, potentially leading to low integrity issues.
Since the vulnerability does not affect confidentiality or availability, the impact is limited, but improper session handling could allow unauthorized actions or changes within the system if sessions remain active longer than intended.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability CVE-2026-1272 in IBM Guardium Data Protection versions 12.0, 12.1, and 12.2 is caused by insufficient session expiration in the user access control panel.
There are no known workarounds or mitigations other than applying the official updates provided by IBM.
- Promptly apply the security updates released by IBM for the affected versions (12.0, 12.1, and 12.2) to remediate the issue.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how CVE-2026-1272 affects compliance with common standards and regulations such as GDPR or HIPAA.