โ† Back to Cyber Intelligence News
Live Threat Intelligence API โ€” Query this CVE and all KEV alerts in real-time
cyber.mcp.brunosan.de
Cyber Threat Intelligence VULNERABILITY ๐Ÿ”ด 1ร—KEV

CVE-2026-1340 in IBM Product: Actively Exploited, Added to CISA KEV

๐Ÿ“… April 09, 2026 ๐Ÿ”ด Exploit Risk: 0.471 ๐Ÿ“Š Intelligence Score: 67/100 ๐Ÿ“ฐ 50 sources synthesized
TL;DR โ€” Read this first
Intelligence Metadata
First Reported Bynvd.nist.gov
Outbreak Velocity1380 minutes spread to 2 unique domains
Consensus50 articles across 2 unique domains
CVSS ScoreNot available
EPSS Score0.67744 (67.74th percentile)
CISA KEV StatusConfirmed
Exploit Risk Score0.4710
Race LabelZERO-DAY RACE

Technical Analysis

Technical details regarding the vulnerability class, attack vector, and preconditions for CVE-2026-1340 are not available in the provided intelligence. The vulnerability was registered by NVD but has not yet been assigned a CVSS score.

Despite the lack of public technical information, its inclusion in the CISA KEV catalog is a CONFIRMED indicator of active, real-world exploitation. This implies that threat actors have developed a functional exploit and are using it against vulnerable systems. The high EPSS score further corroborates the high likelihood of exploitation activity.

Affected Systems

Vendor: IBM
Affected Versions:
  • Not available
Exposure: Not available
Blast Radius: Not available

Intelligence Context

The primary threat signal for CVE-2026-1340 is its status as a CISA KEV entry, which overrides all other metrics. While the vulnerability lacks a CVSS score and the vendor risk score is low (0.05), the CONFIRMED evidence of exploitation demands immediate attention from defenders. The high EPSS score (0.67744) aligns with the KEV status, indicating a high probability of exploitation activity. The 'ZERO-DAY RACE' label, combined with its recent addition to the KEV catalog (1 day ago), signifies an urgent threat where defenders are responding to active, ongoing attacks. Prioritization must be based on the KEV status, not the missing CVSS score.

Remediation & Defense

Apply vendor-supplied patches or mitigations immediately upon release. Due to active exploitation, investigate potentially affected systems for signs of compromise.
Patch Status: Not available
Patch Version: Not available
Workarounds:
  • Not available
Detection Hints:
  • Not available

Source Timeline

CVE-2026-1340 ibm vulnerability kev zero-day race