Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1267: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in IBM Planning Analytics Local

0
Medium
VulnerabilityCVE-2026-1267cvecve-2026-1267cwe-200
Published: Tue Mar 17 2026 (03/17/2026, 21:50:24 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Planning Analytics Local

Description

CVE-2026-1267 is a medium severity vulnerability in IBM Planning Analytics Local versions 2. 1. 0 through 2. 1. 17. It allows unauthorized actors with limited privileges to access sensitive application data and administrative functions due to insufficient access controls. The vulnerability does not require user interaction and can be exploited remotely over the network. While it does not impact system integrity or availability, the confidentiality breach could expose critical business data. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching or implementing compensating controls to restrict unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:10:06 UTC

Technical Analysis

CVE-2026-1267 is a vulnerability identified in IBM Planning Analytics Local versions 2.1.0 through 2.1.17 that results from improper access control mechanisms within the application. This flaw allows unauthorized users who possess limited privileges (PR:L) to gain access to sensitive application data and administrative functionalities without proper authorization. The vulnerability is remotely exploitable over the network (AV:N) and does not require user interaction (UI:N). The weakness is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality by allowing unauthorized data disclosure. The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with a vector indicating low attack complexity (AC:L) and no need for user interaction. No public exploits or active exploitation have been reported to date. The root cause is a lack of proper access control enforcement in the affected versions, which could allow attackers with some level of access to escalate their privileges or view sensitive data not intended for them. IBM Planning Analytics Local is widely used in enterprise environments for financial planning and analytics, making the exposure of sensitive data potentially impactful to business operations and compliance requirements.

Potential Impact

The primary impact of CVE-2026-1267 is the unauthorized disclosure of sensitive business and administrative data within IBM Planning Analytics Local environments. This can lead to significant confidentiality breaches, exposing financial plans, operational data, or administrative configurations to unauthorized parties. Such exposure can undermine competitive advantage, violate data privacy regulations, and damage organizational reputation. Although the vulnerability does not directly affect system integrity or availability, the unauthorized access to administrative functionalities could potentially be leveraged in chained attacks to escalate privileges or manipulate configurations indirectly. Organizations relying heavily on IBM Planning Analytics Local for critical business processes may face operational risks if sensitive data is leaked or misused. The absence of known exploits reduces immediate risk, but the medium severity score and ease of remote exploitation warrant prompt attention. The impact is heightened in sectors with stringent compliance requirements such as finance, healthcare, and government, where data confidentiality is paramount.

Mitigation Recommendations

To mitigate CVE-2026-1267, organizations should first apply any patches or updates released by IBM addressing this vulnerability once available. In the absence of immediate patches, administrators should enforce strict network segmentation and limit access to IBM Planning Analytics Local instances to trusted internal networks only. Implement robust role-based access controls (RBAC) and audit existing user privileges to ensure that only authorized personnel have access to sensitive data and administrative functions. Regularly review and harden authentication mechanisms, including enforcing strong password policies and multi-factor authentication where supported. Monitor logs and access patterns for unusual activity that may indicate exploitation attempts. Additionally, consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) to detect and block suspicious access attempts. Conduct security awareness training for administrators to recognize and respond to potential exploitation signs. Finally, maintain up-to-date backups and incident response plans tailored to potential data exposure scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2026-01-20T21:31:01.796Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9d201771bdb1749dc568d

Added to database: 3/17/2026, 10:13:21 PM

Last enriched: 3/25/2026, 1:10:06 AM

Last updated: 5/1/2026, 7:02:40 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses