CVE-2022-47986
CVSS V2 None
CVSS V3 None
Description
IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.
Overview
- CVE ID
- CVE-2022-47986
- Assigner
- psirt@us.ibm.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-17T16:15:10
- Last Modified Date
- 2023-04-26T20:01:32
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:* | 1 | OR | 4.4.1 | |
cpe:2.3:a:ibm:aspera_faspex:4.4.1:patch_level_1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-Deserialization.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/243512 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/6952319 | Patch Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-47986 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47986 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 07:55:52 | Added to TrackCVE | |||
2023-04-17 07:55:54 | Weakness Enumeration | new | ||
2023-04-26 20:03:48 | 2023-04-26T20:01:32 | CVE Modified Date | updated | |
2023-04-26 20:03:48 | Modified | Analyzed | Vulnerability Status | updated |