Vulnerability Description
IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ibm | Aspera Faspex | <= 4.4.1 |
| Linux | Linux Kernel | - |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-DeseriaThird Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/243512VDB EntryVendor Advisory
- https://www.ibm.com/support/pages/node/6952319PatchVendor Advisory
- http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-DeseriaThird Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/243512VDB EntryVendor Advisory
- https://www.ibm.com/support/pages/node/6952319PatchVendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-US Government Resource
FAQ
What is CVE-2022-47986?
CVE-2022-47986 is a vulnerability with a CVSS score of 9.8 (CRITICAL). IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete ...
How severe is CVE-2022-47986?
CVE-2022-47986 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-47986?
Check the references section above for vendor advisories and patch information. Affected products include: Ibm Aspera Faspex, Linux Linux Kernel, Microsoft Windows.