CVE-2022-47986
Scores
EPSS Score
0.9435
CVSS
3.x 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
All CVSS Scores
CVSS 4.0
0.0CVSS 3.x
9.8Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.0
0.0Description
IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.
Sources
nvd
CWEs
CWE-502
Related Vulnerabilities
Exploits
Vulnerable Software
Type: Configuration
Vendor: ibm
Product: aspera_faspex
Operating System: * * *
Trait:
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.4.1",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:ibm:aspera_faspex:4.4.2:-:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:ibm:aspera_faspex:4.4.2:patch_level_1:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd