HIGH · 7.5

CVE-2020-4436

Certain IBM Aspera applications are vulnerable to buffer overflow after valid authentication, which could allow an attacker with intimate knowledge of the system to execute arbitrary code through a se...

Vulnerability Description

Certain IBM Aspera applications are vulnerable to buffer overflow after valid authentication, which could allow an attacker with intimate knowledge of the system to execute arbitrary code through a service. IBM X-Force ID: 180902.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
IbmAspera Application Platform On Demand<= 3.7.4
IbmAspera Faspex On Demand<= 3.7.4
IbmAspera High-Speed Transfer Endpoint<= 3.9.3
IbmAspera High-Speed Transfer Server<= 3.9.3
IbmAspera High-Speed Transfer Server For Cloud Pak For Integration<= 3.9.10
IbmAspera Proxy Server<= 1.4.3
IbmAspera Server On Demand<= 3.7.4
IbmAspera Shares On Demand<= 3.7.4
IbmAspera Streaming<= 3.9.3
IbmAspera Transfer Cluster Manager<= 1.3.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-4436?

CVE-2020-4436 is a vulnerability with a CVSS score of 7.5 (HIGH). Certain IBM Aspera applications are vulnerable to buffer overflow after valid authentication, which could allow an attacker with intimate knowledge of the system to execute arbitrary code through a se...

How severe is CVE-2020-4436?

CVE-2020-4436 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-4436?

Check the references section above for vendor advisories and patch information. Affected products include: Ibm Aspera Application Platform On Demand, Ibm Aspera Faspex On Demand, Ibm Aspera High-Speed Transfer Endpoint, Ibm Aspera High-Speed Transfer Server, Ibm Aspera High-Speed Transfer Server For Cloud Pak For Integration.