IBM Aspera Faspex code execution
CVE-2022-47986
Key Information:
- Vendor
IBM
- Status
- Vendor
- CVE Published:
- 17 February 2023
Badges
What is CVE-2022-47986?
A vulnerability exists in IBM Aspera Faspex that stems from a flaw in YAML deserialization, which could potentially let a remote attacker execute arbitrary code on the system. The issue arises when a specially crafted obsolete API call is sent to the service, exploiting this deserialization flaw. This vulnerability affects versions 4.4.2 Patch Level 1 and earlier, and was rectified in Faspex 4.4.2 PL2, making it crucial for users to update to the latest version to mitigate risks.
CISA has reported CVE-2022-47986
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2022-47986 as being exploited and is known by the CISA as enabling ransomware campaigns.
The CISA's recommendation is: Apply updates per vendor instructions.
Affected Version(s)
Aspera Faspex 4.4.2 Patch Level 1 and earlier
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
94% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 💰
Used in Ransomware
- 👾
Exploit known to exist
- 🦅
CISA Reported
Vulnerability published
Vulnerability Reserved