CVE-2026-40979 — In Spring AI, having access to a shared environment can

CVE-2026-40979 — In Spring AI, having access to a shared environment can

CVE-2026-40979 — In Spring AI, having access to a shared environment can expose the ONNX model used by the application. Affected versions: Spring AI: 1.0.0 - 1.0.5 (fixed in 1.0.6), 1.1.0 - 1.1.4 (fixed in 1.1.5)

What This Means For You

  • If your environment is affected by CWE-377, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-40979 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

medium T1190 Initial Access

Spring AI ONNX Model Exposure via Shared Environment - CVE-2026-40979

Sigma YAML — free preview
title: Spring AI ONNX Model Exposure via Shared Environment - CVE-2026-40979
id: scw-2026-04-28-ai-1
status: experimental
level: medium
description: |
  Detects the execution of Java processes that appear to be interacting with ONNX models, specifically targeting the Spring AI library's known vulnerability (CVE-2026-40979). This rule aims to identify potential exploitation attempts where an attacker might try to access or manipulate the ONNX model in a shared environment.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-40979/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: process_creation
detection:
  selection:
      Image|contains:
          - 'java.exe'
      CommandLine|contains:
          - 'spring.ai.onnx'
          - 'model.onnx'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40979 vulnerability CVE-2026-40979
CWE-377 weakness CWE-377
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 28, 2026 at 12:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-6521 — Denial of Service

CVE-2026-6521 — OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

vulnerabilityCVEmedium-severitydenial-of-servicecwe-835
/SCW Vulnerability Desk /MEDIUM /5.5 /⚑ 2 IOCs /⚙ 1 Sigma

CVE-2026-6520 — Denial of Service

CVE-2026-6520 — OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

vulnerabilityCVEmedium-severitydenial-of-servicecwe-835
/SCW Vulnerability Desk /MEDIUM /5.5 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-6519 — Denial of Service

CVE-2026-6519 — MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

vulnerabilityCVEmedium-severitydenial-of-servicecwe-835
/SCW Vulnerability Desk /MEDIUM /5.5 /⚑ 2 IOCs /⚙ 2 Sigma