High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2026-4101
HighVulnerability Description
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 under certain load conditions could allow an attacker to bypass authentication mechanisms and gain unauthorized access to the application.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
21 configuration(s) from 1 vendor(s)
cpe:2.3:a:ibm:security_verify_access:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:verify_identity_access:11.0.1.0:-:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:verify_identity_access:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.8:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:security_verify_access:10.0.9.0:-:*:*:*:*:*:*
References & Resources
Severity Details
Weakness Type (CWE)
Improper Authentication
- Description
- When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
- Exploit Likelihood
- High
- Typical Severity
- High
- OWASP Top 10
- A07:2021-Identification/Auth Failures
- Abstraction Level
- Class
Key Information
- Published Date
- April 01, 2026
