{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4917","assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","state":"PUBLISHED","assignerShortName":"ibm","dateReserved":"2026-03-26T17:42:57.635Z","datePublished":"2026-04-22T23:27:45.961Z","dateUpdated":"2026-04-23T16:24:06.376Z"},"containers":{"cna":{"providerMetadata":{"orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm","dateUpdated":"2026-04-22T23:27:45.961Z"},"title":"IBM Guardium Data Protection is affected by multiple vulnerabilities","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"affected":[{"vendor":"IBM","product":"Guardium Data Protection","versions":[{"status":"affected","version":"12.1","versionType":"semver"}],"cpes":["cpe:2.3:a:ibm:guardium_data_protection:12.1:*:*:*:*:*:*:*","cpe:2.3:a:ibm:guardium_data_protection:12.1.0:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"IBM Guardium Data Protection 12.1 could allow an administrative user to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to write arbitrary files on the system.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>IBM Guardium Data Protection 12.1 could allow an administrative user to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to write arbitrary files on the system.</p>"}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7270422","tags":["vendor-advisory","patch"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":4.9,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}}],"solutions":[{"lang":"en","value":"IBM encourages customers to update their systems promptly. ProductVersions FixIBM Guardium Data Protection12.1https://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&amp;product=ibm/Information+Management/InfoSphere+Guardium&amp;release=12.1&amp;platform=Linux&amp;function=fixId&amp;fixids=SqlGuard-12.0p140_Bundle&amp;includeSupersedes=0&amp;source=fc","supportingMedia":[{"type":"text/html","base64":false,"value":"<div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><p><strong>IBM encourages customers to update their systems promptly.</strong></p></div></div></div></div></div></div></div><div><div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div><table><tbody><tr><td><strong>&nbsp;Product</strong></td><td><strong>Versions</strong></td><td><strong>&nbsp;Fix</strong></td></tr><tr><td>IBM Guardium Data Protection</td><td>12.1</td><td><a href=\"https://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&amp;product=ibm/Information+Management/InfoSphere+Guardium&amp;release=12.1&amp;platform=Linux&amp;function=fixId&amp;fixids=SqlGuard-12.0p140_Bundle&amp;includeSupersedes=0&amp;source=fc\" rel=\"nofollow\">https://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&amp;product=ibm/Information+Management/InfoSphere+Guardium&amp;release=12.1&amp;platform=Linux&amp;function=fixId&amp;fixids=SqlGuard-12.0p140_Bundle&amp;includeSupersedes=0&amp;source=fc</a></td></tr></tbody></table></div></div></div><p></p>"}]}],"x_generator":{"engine":"ibm-cvegen"},"credits":[{"lang":"en","value":"benjamin.dixon.vaca8k@statefarm.com, benjamin.dixon.vaca8k@statefarm.com, benjamin.dixon.vaca8k@statefarm.com","type":"finder"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-23T14:04:33.173631Z","id":"CVE-2026-4917","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-23T16:24:06.376Z"}}]}}