⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2023-03-14.

CVE-2022-47986Deserialization of Untrusted Data in IBM Aspera Faspex

Severity
9.8CRITICALNVD
EPSS
94.3%
top 0.04%
CISA KEV
KEVRansomware
Added 2023-02-21
Due 2023-03-14
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 17
KEV addedFeb 21
KEV dueMar 14
Latest updateOct 29
CISA Required Action: Apply updates per vendor instructions.

Description

IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDibm/aspera_faspex4.4.1+1
CVEListV5ibm/aspera_faspex4.4.2 Patch Level 1 and earlier

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3w56-qhmc-wqwr: IBM Aspera Faspex 42023-02-17
CVEList
IBM Aspera Faspex code execution2023-02-17
VulnCheck
IBM Aspera Faspex Code Execution Vulnerability2022

💥Exploits & PoCs

2
Exploit-DB
IBM Aspera Faspex 4.4.1 - YAML deserialization (RCE)2023-04-07
Nuclei
IBM Aspera Faspex <=4.4.2 PL1 - Remote Code Execution

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS IBM Aspera Faspex Pre-Auth RCE Attempt (CVE-2022-47986)2024-10-29

📋Vendor Advisories

1
CISA
IBM Aspera Faspex Code Execution Vulnerability2023-02-21

🕵️Threat Intelligence

2
Sentinelone
IceFire Ransomware Returns | Now Targeting Linux Enterprise Networks2023-03-09
Sentinelone
IceFire Ransomware Returns | Now Targeting Linux Enterprise Networks2023-03-09
CVE-2022-47986 — Deserialization of Untrusted Data | cvebase