Lucene search

K
ibmIBM4A93FE94D5D7DA045DCC7375D4CE97E6D3452D569F114FB1EDC07FC5279234F2
HistoryMay 05, 2023 - 2:58 p.m.

Security Bulletin: Vulnerability in SnakeYaml affects IBM Process Mining . CVE-2022-1471

2023-05-0514:58:52
www.ibm.com
56

0.008 Low

EPSS

Percentile

81.7%

Summary

There is a vulnerability in SnakeYaml that could allow a remote authenticated attacker to execute arbitrary code on the system. The code is used by IBM Process Mining. This bulletin identifies the security fixes to apply to address the vulnerability.

Vulnerability Details

CVEID:CVE-2022-1471
**DESCRIPTION:**SnakeYaml could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the Constructor class. By using a specially-crafted yaml content, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/241118 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Process Mining 1.13.0,1.13.1,1.13.2

Remediation/Fixes

Remediation/Fixes guidance:

Product(s) **Version(s) number and/or range ** Remediation/Fix/Instructions
IBM Process Mining 1.13.0,1.13.1,1.13.2

Upgrade to version 1.14.0.0

1.Login to PassPortAdvantage

2. Search for
M0BMPML Process Mining 1.14.0.0 Server Multiplatform Multilingual

3. Download package

4. Follow install instructions

5. Repeat for M0BMQML Process Mining 1.14.0.0 Client Windows Multilingual

| |

Workarounds and Mitigations

Workarounds/Mitigation guidance:

None known