Advisory Published

IBM-XFORCE-243512

First published: Thu Feb 02 2023(Updated: )

IBM Aspera Faspex code execution

Affected SoftwareAffected VersionHow to fix
IBM Aspera Faspex<=4.4.2
IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of IBM-XFORCE-243512?

    The severity of IBM-XFORCE-243512 is critical.

  • How does IBM Aspera Faspex code execution vulnerability occur?

    The IBM Aspera Faspex code execution vulnerability occurs due to a YAML deserialization flaw.

  • How can a remote attacker exploit the IBM Aspera Faspex code execution vulnerability?

    A remote attacker can exploit the IBM Aspera Faspex code execution vulnerability by sending a specially crafted obsolete API call.

  • What is the affected software version of the IBM Aspera Faspex code execution vulnerability?

    The affected software version of the IBM Aspera Faspex code execution vulnerability is 4.4.2 Patch Level 1 and earlier.

  • How can I fix the IBM Aspera Faspex code execution vulnerability?

    To fix the IBM Aspera Faspex code execution vulnerability, refer to the appropriate IBM Security Bulletin for patch, upgrade, or suggested workaround information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203