{
  "document" : {
    "aggregate_severity" : {
      "text" : "hoch"
    },
    "category" : "csaf_base",
    "csaf_version" : "2.0",
    "distribution" : {
      "tlp" : {
        "label" : "WHITE",
        "url" : "https://www.first.org/tlp/"
      }
    },
    "lang" : "de-DE",
    "notes" : [ {
      "category" : "legal_disclaimer",
      "text" : "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen."
    }, {
      "category" : "description",
      "text" : "IBM Tivoli Network Manager ist eine Netzanalysesoftware für das Management komplexer Netze. Diese Software erfasst und verteilt Layer-2- und Layer-3-Netzdaten.",
      "title" : "Produktbeschreibung"
    }, {
      "category" : "summary",
      "text" : "Ein Angreifer kann mehrere Schwachstellen in IBM Tivoli Network Manager ausnutzen, um beliebigen Programmcode auszuführen, um einen Denial of Service Angriff durchzuführen, um Informationen offenzulegen, und um Sicherheitsvorkehrungen zu umgehen.",
      "title" : "Angriff"
    }, {
      "category" : "general",
      "text" : "- Linux\n- UNIX\n- Windows",
      "title" : "Betroffene Betriebssysteme"
    } ],
    "publisher" : {
      "category" : "other",
      "contact_details" : "csaf-provider@cert-bund.de",
      "name" : "Bundesamt für Sicherheit in der Informationstechnik",
      "namespace" : "https://www.bsi.bund.de"
    },
    "references" : [ {
      "category" : "self",
      "summary" : "WID-SEC-W-2026-1032 - CSAF Version",
      "url" : "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1032.json"
    }, {
      "category" : "self",
      "summary" : "WID-SEC-2026-1032 - Portal Version",
      "url" : "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1032"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7268900 vom 2026-04-08",
      "url" : "https://www.ibm.com/support/pages/node/7268900"
    } ],
    "source_lang" : "en-US",
    "title" : "IBM Tivoli Network Manager: Mehrere Schwachstellen",
    "tracking" : {
      "current_release_date" : "2026-04-08T22:00:00.000+00:00",
      "generator" : {
        "date" : "2026-04-09T11:10:18.974+00:00",
        "engine" : {
          "name" : "BSI-WID",
          "version" : "1.5.0"
        }
      },
      "id" : "WID-SEC-W-2026-1032",
      "initial_release_date" : "2026-04-08T22:00:00.000+00:00",
      "revision_history" : [ {
        "date" : "2026-04-08T22:00:00.000+00:00",
        "number" : "1",
        "summary" : "Initiale Fassung"
      } ],
      "status" : "final",
      "version" : "1"
    }
  },
  "product_tree" : {
    "branches" : [ {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "IP Edition <4.2.0.24",
          "product" : {
            "name" : "IBM Tivoli Network Manager IP Edition <4.2.0.24",
            "product_id" : "T052592"
          }
        }, {
          "category" : "product_version",
          "name" : "IP Edition 4.2.0.24",
          "product" : {
            "name" : "IBM Tivoli Network Manager IP Edition 4.2.0.24",
            "product_id" : "T052592-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:tivoli_network_manager:ip_edition__4.2.0.24"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Tivoli Network Manager"
      } ],
      "category" : "vendor",
      "name" : "IBM"
    } ]
  },
  "vulnerabilities" : [ {
    "cve" : "CVE-2023-48795",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2023-48795"
  }, {
    "cve" : "CVE-2025-11226",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-11226"
  }, {
    "cve" : "CVE-2025-40918",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-40918"
  }, {
    "cve" : "CVE-2025-48924",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-48924"
  }, {
    "cve" : "CVE-2025-53864",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-53864"
  }, {
    "cve" : "CVE-2025-55163",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-55163"
  }, {
    "cve" : "CVE-2025-64775",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-64775"
  }, {
    "cve" : "CVE-2025-66675",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-66675"
  }, {
    "cve" : "CVE-2025-68161",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-68161"
  }, {
    "cve" : "CVE-2026-1225",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-1225"
  }, {
    "cve" : "CVE-2026-21925",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-21925"
  }, {
    "cve" : "CVE-2026-21932",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-21932"
  }, {
    "cve" : "CVE-2026-21933",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-21933"
  }, {
    "cve" : "CVE-2026-21945",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-21945"
  }, {
    "cve" : "CVE-2026-24281",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-24281"
  }, {
    "cve" : "CVE-2026-24308",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-24308"
  }, {
    "cve" : "CVE-2026-27171",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-27171"
  }, {
    "cve" : "CVE-2026-3381",
    "product_status" : {
      "known_affected" : [ "T052592" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-3381"
  } ]
}