CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.8%
IBM Sterling Connect:Direct for UNIX components Install Agent and File Agent are vulnerable to remote code execution due to Apache Commons Text [CVE-2022-42889]. Apache Commons Text has been upgraded to version 1.10.0 in IBM Sterling Connect:Direct for UNIX Install Agent and File Agent.
**CVEID:**CVE-2022-42889 DESCRIPTION: Apache Commons Text could allow a remote attacker to execute arbitrary code on the system, caused by an insecure interpolation defaults flaw. By sending a specially-crafted input, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/238560 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Product(s) | Version(s) |
---|---|
IBM Sterling Connect:Direct for UNIX | 6.2.0.0 - 6.2.0.5.iFix003 |
IBM Sterling Connect:Direct for UNIX | 6.1.0.0 - 6.1.0.4.iFix068 |
IBM Sterling Connect:Direct for UNIX | 6.0.0.0 - 6.0.0.2.iFix138 |
IBM Sterling Connect:Direct for UNIX | 4.3.0.0 - 4.3.0.1.iFix102 |
IBM strongly recommends addressing the vulnerability now by upgrading
Product | Version | Remediation/Fix/Instructions |
---|---|---|
IBM Sterling Connect:Direct for UNIX | 6.2.0 | Apply 6.2.0.5.iFix004, available on Fix Central. |
IBM Sterling Connect:Direct for UNIX | 6.1.0 | Apply 6.1.0.4.iFix069, available on Fix Central. |
IBM Sterling Connect:Direct for UNIX | 6.0.0 | Apply 6.0.0.2.iFix139, available on Fix Central. |
IBM Sterling Connect:Direct for UNIX | 4.3.0 | Apply 4.3.0.1.iFix103, available on Fix Central. |
None
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | sterling_connect\ | direct_for_unix | cpe:2.3:a:ibm:sterling_connect\:direct_for_unix:6.2.0:*:*:*:*:*:*:* |
ibm | sterling_connect\ | direct_for_unix | cpe:2.3:a:ibm:sterling_connect\:direct_for_unix:6.1.0:*:*:*:*:*:*:* |
ibm | sterling_connect\ | direct_for_unix | cpe:2.3:a:ibm:sterling_connect\:direct_for_unix:6.0.0:*:*:*:*:*:*:* |
ibm | sterling_connect\ | direct_for_unix | cpe:2.3:a:ibm:sterling_connect\:direct_for_unix:4.3.0:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.8%