{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4788","assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","state":"PUBLISHED","assignerShortName":"ibm","dateReserved":"2026-03-24T19:37:42.923Z","datePublished":"2026-04-08T00:20:03.695Z","dateUpdated":"2026-04-09T03:56:00.826Z"},"containers":{"cna":{"providerMetadata":{"orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm","dateUpdated":"2026-04-08T00:20:03.695Z"},"title":"Multiple Vulnerabilities affect IBM Tivoli Netcool Impact","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-532","description":"CWE-532 Insertion of Sensitive Information into Log File","type":"CWE"}]}],"affected":[{"vendor":"IBM","product":"Tivoli Netcool Impact","versions":[{"status":"affected","version":"7.1.0.0","lessThanOrEqual":"7.1.0.37","versionType":"semver"}],"cpes":["cpe:2.3:a:ibm:tivoli_netcool_impact:7.1.0.0:*:*:*:*:*:*:*","cpe:2.3:a:ibm:tivoli_netcool_impact:7.1.0.37:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files that could be read by a local user.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files that could be read by a local user.</p>"}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7268267","tags":["vendor-advisory","patch"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":8.4,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}}],"solutions":[{"lang":"en","value":"IBM strongly recommends addressing the vulnerability now by upgrading to 7.1.0 FP38\n\nProductVRMFRemediationIBM Tivoli Netcool Impact7.1.0.38Upgrade to  IBM Tivoli Netcool Impact 7.1.0 Fix Pack 38 https://www.ibm.com/support/pages/node/7184732  or later.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><strong>IBM strongly recommends addressing the vulnerability now by upgrading to 7.1.0 FP38</strong></p><div><table><tbody><tr><td>Product</td><td>VRMF</td><td>Remediation</td></tr><tr><td>IBM Tivoli Netcool Impact</td><td>7.1.0.38</td><td>Upgrade to <a href=\"https://www.ibm.com/support/pages/node/7184732\" rel=\"nofollow\">IBM Tivoli Netcool Impact 7.1.0 Fix Pack 38</a> or later.</td></tr></tbody></table></div>"}]}],"x_generator":{"engine":"ibm-cvegen"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-08T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2026-4788"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-09T03:56:00.826Z"}}]}}