Malware gaps in IBM WebSphere Application Server Liberty and Netcool/OMNIbus

Attackers can target IBM's application server WebSphere Application Server Liberty and the network monitoring solution Tivoli Netcool/OMNIbus.

listen Print view
A symbolic update bar is filling up.

(Image: AFANASEV IVAN / Shutterstock.com)

2 min. read

Admins managing instances with IBM WebSphere Application Server Liberty or Tivoli Netcool/OMNIbus should secure their systems promptly. If not, attackers could execute malware in the worst-case scenario. IBM has not yet mentioned any ongoing attacks. However, for WebSphere Application Server Liberty, there is currently only a preliminary solution to protect computers from attacks.

In a warning message, the developers describe that attackers can target WebSphere Application Server Liberty via a path traversal vulnerability (CVE-2025-14914 “high”). However, systems are only vulnerable if the restConnector-1.0 or restConnector-2.0 feature is active.

If this is the case, attackers can upload crafted zip archives due to insufficient checks and thus overwrite files in actually isolated paths. Ultimately, this can lead to the execution of malware.

According to the developers, versions 17.0.0.3 up to and including 26.0.0.1 are affected. No security update has been released yet. In a post, IBM refers to an “interim solution” (Interim Fix) to protect instances nonetheless.

Videos by heise

The vulnerability (CVE-2026-1188 “medium”) in Tivoli Netcool/OMNIbus impacts IBM Runtime Environment Java. At this point, attackers can trigger memory errors in an unspecified way. Such an event typically leads to crashes. However, in this context, malware often also gets onto PCs and compromises them.

According to IBM, versions 8.1.0 up to and including 8.1.0.35 are impacted. Tivoli Netcool/OMNIbus 8.1.0.36 is expected to be protected against the described attack.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.