CVE-2026-1491
MediumVulnerability Description
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 IBM Security Verify could allow a remote attacker to access sensitive information due to an inconsistent interpretation of an HTTP request by a reverse proxy.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Known Affected Software
21 configuration(s) from 1 vendor(s)
cpe:2.3:a:ibm:security_verify_access:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:verify_identity_access:11.0.1.0:-:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:verify_identity_access:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.8:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.9.0:-:*:*:*:*:*:*
References & Resources
Severity Details
Weakness Type (CWE)
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
- Description
- The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that…
- Typical Severity
- Medium
- Abstraction Level
- Base
Key Information
- Published Date
- April 01, 2026
