CVE-2022-47986

IBM Aspera Faspex code execution

Basic Information

CVE State
PUBLISHED
Reserved Date
December 28, 2022
Published Date
February 17, 2023
Last Updated
February 13, 2025
Vendor
IBM
Product
Aspera Faspex
Description
IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.
Tags
cisa malware ransomware nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2023-02-21 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2023-02-03 06:32:13 UTC) Source
Used in Malware
Yes (added 2023-02-21 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-02-21 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

ohnonoyesyes/CVE-2022-47986

Type: github • Created: 2023-02-03 06:32:13 UTC • Stars: 6

Aspera Faspex Pre Auth RCE

Timeline

  • CVE ID Reserved

  • Proof of Concept Exploit Available

  • CVE Published to Public

  • Exploit Used in Malware

  • Added to KEVIntel

  • Detected by Nuclei