{"api_version":"1","generated_at":"2026-04-22T16:03:51+00:00","cve":"CVE-2026-4820","urls":{"html":"https://cve.report/CVE-2026-4820","api":"https://cve.report/api/cve/CVE-2026-4820.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-4820","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-4820"},"summary":{"title":"IBM Maximo Application Suite was vulnerable to because Cookie ltpatoken2_<workspace_name> was not set with secure flag","description":"IBM Maximo Application Suite 9.1, 9.0, 8.11, and 8.10 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.","state":"PUBLISHED","assigner":"ibm","published_at":"2026-04-01 21:17:02","updated_at":"2026-04-07 16:28:01"},"problem_types":["CWE-614","CWE-319","CWE-614 CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute"],"metrics":[{"version":"3.1","source":"psirt@us.ibm.com","type":"Primary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://www.ibm.com/support/pages/node/7268028","name":"https://www.ibm.com/support/pages/node/7268028","refsource":"psirt@us.ibm.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-4820","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4820","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"IBM","product":"Maximo Application Suite","version":"affected 9.1.0 10.6.5.0 semver","platforms":[]},{"source":"CNA","vendor":"IBM","product":"Maximo Application Suite","version":"affected 9.0 semver","platforms":[]},{"source":"CNA","vendor":"IBM","product":"Maximo Application Suite","version":"affected 8.11.0 semver","platforms":[]},{"source":"CNA","vendor":"IBM","product":"Maximo Application Suite","version":"affected 8.10 semver","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"Remediated Product(s)Version(s)IBM Maximo Application Suite9.1.8IBM Maximo Application Suite9.0.19IBM Maximo Application Suite8.11.30IBM Maximo Application Suite8.10.33","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"4820","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"maximo_application_suite","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"4820","cve":"CVE-2026-4820","epss":"0.000110000","percentile":"0.014350000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:39"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-4820","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-02T15:51:25.221671Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-02T15:51:44.073Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"cpes":["cpe:2.3:a:ibm:maximo_application_suite:9.1:*:*:*:*:*:*:*","cpe:2.3:a:ibm:maximo_application_suite:9.1.0:*:*:*:*:*:*:*","cpe:2.3:a:ibm:maximo_application_suite:9.0:*:*:*:*:*:*:*","cpe:2.3:a:ibm:maximo_application_suite:9.0.0:*:*:*:*:*:*:*","cpe:2.3:a:ibm:maximo_application_suite:8.11:*:*:*:*:*:*:*","cpe:2.3:a:ibm:maximo_application_suite:8.11.0:*:*:*:*:*:*:*","cpe:2.3:a:ibm:maximo_application_suite:8.10:*:*:*:*:*:*:*","cpe:2.3:a:ibm:maximo_application_suite:8.10.0:*:*:*:*:*:*:*"],"product":"Maximo Application Suite","vendor":"IBM","versions":[{"lessThanOrEqual":"10.6.5.0","status":"affected","version":"9.1.0","versionType":"semver"},{"status":"affected","version":"9.0","versionType":"semver"},{"status":"affected","version":"8.11.0","versionType":"semver"},{"status":"affected","version":"8.10","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>IBM Maximo Application Suite 9.1, 9.0, 8.11, and 8.10 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.</p>"}],"value":"IBM Maximo Application Suite 9.1, 9.0, 8.11, and 8.10 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-614","description":"CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-01T20:54:09.417Z","orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm"},"references":[{"tags":["vendor-advisory","patch"],"url":"https://www.ibm.com/support/pages/node/7268028"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<table><tbody><tr><td>Remediated Product(s)</td><td>Version(s)</td></tr><tr><td>IBM Maximo Application Suite</td><td>9.1.8</td></tr><tr><td>IBM Maximo Application Suite</td><td>9.0.19</td></tr><tr><td>IBM Maximo Application Suite</td><td>8.11.30</td></tr><tr><td>IBM Maximo Application Suite</td><td>8.10.33</td></tr></tbody></table>"}],"value":"Remediated Product(s)Version(s)IBM Maximo Application Suite9.1.8IBM Maximo Application Suite9.0.19IBM Maximo Application Suite8.11.30IBM Maximo Application Suite8.10.33"}],"title":"IBM Maximo Application Suite was vulnerable to because Cookie ltpatoken2_<workspace_name> was not set with secure flag","x_generator":{"engine":"ibm-cvegen"}}},"cveMetadata":{"assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","assignerShortName":"ibm","cveId":"CVE-2026-4820","datePublished":"2026-04-01T20:54:09.417Z","dateReserved":"2026-03-25T13:48:17.676Z","dateUpdated":"2026-04-02T15:51:44.073Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-01 21:17:02","lastModifiedDate":"2026-04-07 16:28:01","problem_types":["CWE-614","CWE-319","CWE-614 CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute"],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*","versionStartIncluding":"8.10","versionEndExcluding":"8.10.33","matchCriteriaId":"31F32ACF-51E7-490F-BC1B-431F002FCA49"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*","versionStartIncluding":"8.11","versionEndExcluding":"8.11.30","matchCriteriaId":"0157833D-F63E-4B9B-B51C-D9FFD7AD0167"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0","versionEndExcluding":"9.0.19","matchCriteriaId":"F7367CAC-E918-46BA-99D2-23397732FD90"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1","versionEndExcluding":"9.1.8","matchCriteriaId":"F7858D3F-F186-489A-A651-F4BFAE27A72C"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"4820","Ordinal":"1","Title":"IBM Maximo Application Suite was vulnerable to because Cookie lt","CVE":"CVE-2026-4820","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"4820","Ordinal":"1","NoteData":"IBM Maximo Application Suite 9.1, 9.0, 8.11, and 8.10 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.","Type":"Description","Title":"IBM Maximo Application Suite was vulnerable to because Cookie lt"}]}}}