PatchSiren cyber security CVE debrief
CVE-2016-9008 IBM CVE debrief
CVE-2016-9008 is a high-severity access-control issue in IBM UrbanCode Deploy. NVD and IBM’s referenced advisory identify affected releases across the 6.0, 6.1, and 6.2 lines up to 6.2.2.1. The flaw could allow a malicious user to reach the Agent Relay ActiveMQ Broker JMX interface and run plugins on the agent.
- Vendor
- IBM
- Product
- CVE-2016-9008
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-01
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-01
- Advisory updated
- 2026-05-13
Who should care
IBM UrbanCode Deploy administrators, DevOps/platform teams, and security teams responsible for agent relay exposure, JMX access, and patch compliance.
Technical summary
NVD classifies the issue as CVSS 3.0 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and maps it to CWE-284 (improper access control). The supplied description states that a malicious user could access the Agent Relay ActiveMQ Broker JMX interface and run plugins on the agent, indicating a network-reachable integrity-impacting control issue.
Defensive priority
High. Prioritize remediation for any IBM UrbanCode Deploy deployment in the affected version ranges, especially where agent relay or JMX-related services are reachable from untrusted networks.
Recommended defensive actions
- Apply the vendor patch or follow IBM’s advisory referenced in the NVD record.
- Inventory IBM UrbanCode Deploy instances and confirm whether any are within the affected version ranges listed by NVD (6.0 through 6.2.2.1 variants shown in the corpus).
- Restrict network access to agent relay and JMX-related interfaces so only trusted administrative paths can reach them.
- Review logs and configuration for unexpected plugin execution or unauthorized access attempts on agents.
- Validate that compensating controls and patch levels remain in place after any upgrades or maintenance windows.
Evidence notes
The debrief is based only on the supplied NVD corpus entry, which provides the CVE description, CVSS vector, CWE-284 classification, affected CPE criteria, and references to IBM’s vendor advisory and a SecurityFocus third-party entry. No exploit mechanics beyond the supplied description are included.
Official resources
-
CVE-2016-9008 CVE record
CVE.org
-
CVE-2016-9008 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
CVE published on 2017-02-01T22:59:01.150Z and last modified in the supplied corpus on 2026-05-13T00:24:29.033Z.