TROYANOSYVIRUS
Retour aux CVEs

CVE-2022-47986

CRITICALCISA KEV
9.8

Description

IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie2/17/2023
Derniere modification10/27/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurIBM
ProduitAspera Faspex
Nom vulnerabiliteIBM Aspera Faspex Code Execution Vulnerability
Date ajout KEV2023-02-21
Date limite remediation2023-03-14
Utilise dans ransomwareKnown

Produits affectes

ibm:aspera_faspexlinux:linux_kernelmicrosoft:windows

Faiblesses (CWE)

CWE-502

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.