PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9008 IBM CVE debrief

CVE-2016-9008 is a high-severity access-control issue in IBM UrbanCode Deploy. NVD and IBM’s referenced advisory identify affected releases across the 6.0, 6.1, and 6.2 lines up to 6.2.2.1. The flaw could allow a malicious user to reach the Agent Relay ActiveMQ Broker JMX interface and run plugins on the agent.

Vendor
IBM
Product
CVE-2016-9008
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-01
Original CVE updated
2026-05-13
Advisory published
2017-02-01
Advisory updated
2026-05-13

Who should care

IBM UrbanCode Deploy administrators, DevOps/platform teams, and security teams responsible for agent relay exposure, JMX access, and patch compliance.

Technical summary

NVD classifies the issue as CVSS 3.0 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and maps it to CWE-284 (improper access control). The supplied description states that a malicious user could access the Agent Relay ActiveMQ Broker JMX interface and run plugins on the agent, indicating a network-reachable integrity-impacting control issue.

Defensive priority

High. Prioritize remediation for any IBM UrbanCode Deploy deployment in the affected version ranges, especially where agent relay or JMX-related services are reachable from untrusted networks.

Recommended defensive actions

  • Apply the vendor patch or follow IBM’s advisory referenced in the NVD record.
  • Inventory IBM UrbanCode Deploy instances and confirm whether any are within the affected version ranges listed by NVD (6.0 through 6.2.2.1 variants shown in the corpus).
  • Restrict network access to agent relay and JMX-related interfaces so only trusted administrative paths can reach them.
  • Review logs and configuration for unexpected plugin execution or unauthorized access attempts on agents.
  • Validate that compensating controls and patch levels remain in place after any upgrades or maintenance windows.

Evidence notes

The debrief is based only on the supplied NVD corpus entry, which provides the CVE description, CVSS vector, CWE-284 classification, affected CPE criteria, and references to IBM’s vendor advisory and a SecurityFocus third-party entry. No exploit mechanics beyond the supplied description are included.

Official resources

CVE published on 2017-02-01T22:59:01.150Z and last modified in the supplied corpus on 2026-05-13T00:24:29.033Z.