First published: Wed Mar 30 2022(Updated: )
The cfsend, cfrecv, and CyberResp components of TIBCO Software Inc.'s TIBCO Managed File Transfer Platform Server for UNIX and TIBCO Managed File Transfer Platform Server for z/Linux contain a difficult to exploit Remote Code Execution (RCE) vulnerability that allows a low privileged attacker with network access to execute arbitrary code on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Managed File Transfer Platform Server for UNIX: versions 8.1.0 and below and TIBCO Managed File Transfer Platform Server for z/Linux: versions 8.1.0 and below.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO Managed File Transfer Platform Server | <8.1.1 | |
Ibm Z Linux | ||
Opengroup Unix |
TIBCO has released updated versions of the affected components which address these issues. TIBCO Managed File Transfer Platform Server for UNIX versions 8.1.0 and below update to version 8.1.1 or later TIBCO Managed File Transfer Platform Server for z/Linux versions 8.1.0 and below update to version 8.1.1 or later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22772 is a Remote Code Execution (RCE) vulnerability in the cfsend, cfrecv, and CyberResp components of TIBCO Managed File Transfer Platform Server for UNIX and TIBCO Managed File Transfer Platform Server for z/Linux.
CVE-2022-22772 has a severity rating of 7.5 out of 10 (high severity).
TIBCO Managed File Transfer Platform Server for UNIX versions up to and excluding 8.1.1 are affected.
CVE-2022-22772 requires a low privileged attacker with network access to exploit the vulnerability and execute remote code.
No, IBM z/Linux and Opengroup Unix are not vulnerable to CVE-2022-22772.
To fix CVE-2022-22772, it is recommended to upgrade to a version of TIBCO Managed File Transfer Platform Server for UNIX that is above 8.1.1.