PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-0360 IBM CVE debrief

CVE-2016-0360 is a critical deserialization vulnerability in IBM WebSphere MQ JMS client versions 7.0.1, 7.1, 7.5, 8.0, and 9.0. IBM and NVD describe client classes that deserialize objects from untrusted sources, which could allow arbitrary Java code execution when vulnerable classes are present on the classpath.

Vendor
IBM
Product
CVE-2016-0360
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-15
Original CVE updated
2026-05-13
Advisory published
2017-02-15
Advisory updated
2026-05-13

Who should care

Java application owners, JVM platform teams, and security teams running IBM WebSphere MQ JMS client libraries—especially where the application handles untrusted input or uses broad classpaths.

Technical summary

NVD classifies the issue as CWE-502 (deserialization of untrusted data) and assigns CVSS v3.0 9.8 with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The affected IBM WebSphere MQ JMS client versions listed in the official record are 7.0.1, 7.1, 7.5, 8.0, and 9.0.

Defensive priority

Critical. The combination of unauthenticated network reachability, no user interaction, and high confidentiality/integrity/availability impact makes this a high-priority patching and exposure-reduction item.

Recommended defensive actions

  • Inventory all applications and servers using IBM WebSphere MQ JMS client versions 7.0.1, 7.1, 7.5, 8.0, or 9.0.
  • Apply IBM PSIRT remediation guidance from the vendor advisory and move to a remediated IBM-supported release.
  • Reduce or eliminate deserialization of untrusted objects in affected application paths.
  • Review Java classpaths for unnecessary or vulnerable classes and remove any that expand the attack surface.
  • Limit exposure of affected client code to untrusted sources until remediation is complete.

Evidence notes

The official NVD record lists the affected IBM WebSphere MQ JMS client versions and classifies the weakness as CWE-502 with CVSS v3.0 9.8. The IBM vendor advisory referenced in NVD is the primary remediation source. The supplied corpus does not include exact fixed-version details, so the debrief avoids naming a specific patched release.

Official resources

CVE published 2017-02-15; NVD last modified 2026-05-13. No KEV entry is present in the supplied corpus.