Lucene search

K
ibmIBM0CBA9CA0D70F4597775DAD124CED30CCF20B447BF3FC7D717ADFB7AD589FF806
HistoryFeb 15, 2023 - 2:59 a.m.

Security Bulletin: IBM Watson Assistant for IBM Cloud Pak for Data is vulnerable to SnakeYaml code execution (CVE-2022-1471)

2023-02-1502:59:08
www.ibm.com
30
ibm watson assistant
cloud pak for data
snakeyaml
code execution
cve-2022-1471
upgrade

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.022 Low

EPSS

Percentile

89.4%

Summary

Potential code execution vulnerability in snakeYAML-(CVE-2022-1471) has been identified that may affect IBM Watson Assistant for IBM Cloud Pak for Data. Refer to details for additional information.

Vulnerability Details

CVEID:CVE-2022-1471
**DESCRIPTION:**SnakeYaml could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the Constructor class. By using a specially-crafted yaml content, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/241118 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Watson Assistant for IBM Cloud Pak for Data 1.5.0, 4.0.0, 4.0.2, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.0.8, 4.5.1, 4.5.3, 4.6

Remediation/Fixes

For all affected versions, IBM strongly recommends addressing the vulnerability now by upgrading to the latest (v4.6.2) release of IBM Watson Assistant for IBM Cloud Pak for Data which maintains backward compatibility with the versions listed above.

Product Latest Version Remediation/Fix/Instructions
IBM Watson Assistant for IBM Cloud Pak for Data 4.6.2

Follow instructions for Installing Watson Assistant in Link to Release (v4.6.2 release information)

<https://www.ibm.com/docs/en/cloud-paks/cp-data/4.6.x&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmwatson_developer_cloudMatch1.5.0
OR
ibmwatson_developer_cloudMatch4.0.0
OR
ibmwatson_developer_cloudMatch4.0.2
OR
ibmwatson_developer_cloudMatch4.0.4
OR
ibmwatson_developer_cloudMatch4.0.5
OR
ibmwatson_developer_cloudMatch4.0.6
OR
ibmwatson_developer_cloudMatch4.0.7
OR
ibmwatson_developer_cloudMatch4.0.8
OR
ibmwatson_developer_cloudMatch4.5.1
OR
ibmwatson_developer_cloudMatch4.5.3
OR
ibmwatson_developer_cloudMatch4.6

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.022 Low

EPSS

Percentile

89.4%