CVE-2026-42100
Denial of Service in Sparx Pro Cloud Server
Publication date: 2026-05-19
Last updated on: 2026-05-19
Assigner: CERT.PL
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sparx_systems | pro_cloud_server | to 6.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-228 | The product does not handle or incorrectly handles input that is not syntactically well-formed with respect to the associated specification. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the vulnerability in Sparx Pro Cloud Server affects compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-42100 is a vulnerability in Sparx Systems Pro Cloud Server versions up to 6.1 that allows a Denial of Service (DoS) attack.
The issue arises from improper handling of syntactically invalid SQL queries, which causes the Pro Cloud Server service to terminate unexpectedly when such a query is sent.
The vendor was notified but did not provide details about the vulnerability or confirm the vulnerable version range. Only Pro Cloud Server version 6.1 (build 167) and below were tested and confirmed as vulnerable.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to execute a Denial of Service (DoS) attack on the Sparx Pro Cloud Server.
By sending a specially crafted syntactically invalid SQL query, the attacker can cause the Pro Cloud Server service to terminate unexpectedly, disrupting normal operations and availability of the service.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid using Sparx Systems Pro Cloud Server version 6.1 (build 167) and below, as these versions are confirmed vulnerable.
Since the vendor has not provided details or patches, consider restricting access to the Pro Cloud Server service to trusted users only to reduce the risk of a Denial of Service attack.
Monitor the service for unexpected terminations which may indicate exploitation attempts.