Lucene search

K
ibmIBMA5691FF7C1D0DE331700EB3B0E4E381044E51BEEBF30588BD57DA6D53E711787
HistoryDec 29, 2023 - 2:30 p.m.

Security Bulletin: Vulnerability in SnakeYaml affect Cloud Pak System [CVE-2022-1471]

2023-12-2914:30:03
www.ibm.com
16
snakeyaml
ibm cloud pak system
vulnerability
remote code execution
upgrade
interim fix

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.022 Low

EPSS

Percentile

89.4%

Summary

Vulnerability in SnakeYaml affect Cloud Pak System. [CVE-2022-1471].

Vulnerability Details

CVEID:CVE-2022-1471
**DESCRIPTION:**SnakeYaml could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the Constructor class. By using a specially-crafted yaml content, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/241118 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Cloud Pak System 2.3.3.0 - 2.3.3.6 (Intel)
IBM Cloud Pak System Software Suite 2.3.3.0 - 2.3.3.6 (Intel)
IBM Cloud Pak System 2.3.1.1, 2.3.2.0 (Power)
IBM Cloud Pak System 2.3.3.7 (Power)

Remediation/Fixes

For unsupported version of the product IBM recommends upgrading to a fixed, supported version of the product.

This security bulletin applies to Cloud Pak System, Cloud Pak System Software, Cloud Pak System Software Suite.

For IBM Cloud Pak System v2.3.3.0, v.2.3.3.1, v.2.3.3.2, v.2.3.3.3, v2.3.3.3 iFix 1, v2.3.3.4, v2.3.3.5 for Intel

upgrade to IBM Cloud Pak System v2.3.3.6 for Intel , then apply Cloud Pak System v2.3.3.6 Interim Fix 1

Information on upgrading to Cloud Pak System v.2.3.3.6 at <https://www.ibm.com/support/pages/node/6959035&gt;

For Cloud Pak System V2.3.3.6 for Intel, apply Cloud Pak System V2.3.3.6 Interim Fix 1.

Information on upgrading to Cloud Pak System v.2.3.3.6 Interim Fix at <https://www.ibm.com/support/pages/node/7017280&gt;

For Cloud Pak System V2.3.0.1, V2.3.1.1, V2.3.2.0, for Power

Upgrade to Cloud Pak System v2.3.3.7 and apply V2.3.3.7 Interim Fix 01 at IBM Fix Central.

information on upgrading here <https://www.ibm.com/support/pages/node/6982511&gt;

For Cloud Pak System V2.3.3.7 for Power
Apply Cloud Pak System V2.3.3.7 Interim Fix 01 at IBM Fix Central.

information on upgrading available at <http://www.ibm.com/support/docview.wss?uid=ibm10887959&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmcloud_pak_systemMatch2.3.3
CPENameOperatorVersion
ibm cloud pak system softwareeq2.3.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.022 Low

EPSS

Percentile

89.4%