First published: Thu Feb 02 2023(Updated: )
IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.
Credit: psirt@us.ibm.com psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Aspera Faspex | <=4.4.2 | |
IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier | ||
IBM Aspera Faspex | <=4.4.1 | |
IBM Aspera Faspex | =4.4.2 | |
IBM Aspera Faspex | =4.4.2-patch_level_1 | |
Linux Linux kernel | ||
Microsoft Windows | ||
IBM Aspera Faspex | ||
All of | ||
Any of | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Any of | ||
IBM Aspera Faspex | <=4.4.1 | |
IBM Aspera Faspex | =4.4.2 | |
IBM Aspera Faspex | =4.4.2-patch_level_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-47986 is critical with a value of 9.8.
CVE-2022-47986 affects IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier.
A remote attacker can exploit CVE-2022-47986 by sending a specially crafted obsolete API call.
Refer to the appropriate IBM Security Bulletin for patch, upgrade, or suggested workaround information.
More information about CVE-2022-47986 can be found in the IBM Security Bulletin and CVE Mitre.