HTTP: IBM Aspera Faspex YAML Deserialization Remote Code Execution

This signature detects attempts to exploit a known vulnerability against IBM Aspera Faspex. A successful attack can lead to arbitrary code execution.

Extended Description

IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.

References

CVE: CVE-2022-47986

Short Name
HTTP:CTS:IBM-ASPERA-FSPX-DS-RCE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Aspera CVE-2022-47986 Code Deserialization Execution Faspex IBM Remote YAML
Release Date
05/03/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3802
False Positive
Unknown

Found a potential security threat?