On Tuesday, January 14, an announcement was posted on the IBM's ACS Updates page:
IBM i Access Client Solutions is vulnerable to an attacker carrying out an XML External Entity injection via a crafted XFA file inside of a PDF.
Apache Tika is used by the Run SQL Scripts feature to determine the content type of binary column data in a table on the IBM i.
IBM strongly recommends upgrading to 1.1.9.11, and discontinuing use of versions 1.1.9.8 through 1.1.9.10.
The download was not available until Wednesday morning. When I received the following alert when starting my ACS:



