Lucene search

K
ibmIBM7074F9C58C33D10D30180CDD30AAD93111AB1A1454E19FE590792EA8F883680A
HistoryJul 13, 2022 - 2:41 a.m.

Security Bulletin: Watson Machine Learning Accelerator is affected but not classified as vulnerable by a remote code execution in Spring Framework (CVE-2022-22971)

2022-07-1302:41:51
www.ibm.com
18
watson machine learning
accelerator
remote code execution
spring framework
cve-2022-22971
upgrade
ibm
cloud pak for data
fix
security bulletin
vulnerability
version 2.2.x
version 2.3.x

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

60.3%

Summary

Watson Machine Learning Accelerator is affected but not classified as vulnerable to a remote code execution in Spring Framework (CVE-2022-22971) as it does not meet all of the following criteria: 1. JDK 9 or higher, 2. Apache Tomcat as the Servlet container, 3. Packaged as WAR (in contrast to a Spring Boot executable jar), 4. Spring-webmvc or spring-webflux dependency, 5. Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and older versions. WMLA uses spring framework to manage java application’s dependency injection, events, resources, i18n, validation, data binding, type conversion, SpEL, AOP. The fix includes Spring 5.3.20.

Vulnerability Details

Refer to the security bulletin(s) listed in the Remediation/Fixes section

Affected Products and Versions

Affected Product(s) Version(s)
Watson Machine Learning Accelerator on Cloud Pak for Data 2.2.x; 2.3.x

Remediation/Fixes

1. For Watson Machine Learning Accelerator version 2.2.x

To address the affected version, upgrade to IBM Watson Machine Learning Accelerator 2.2.5 by following the document <https://www.ibm.com/docs/en/cloud-paks/cp-data/3.5.0?topic=accelerator-upgrading-watson-machine-learning&gt;

2. For Watson Machine Learning Accelerator version 2.3.x

To address the affected version, upgrade to IBM Watson Machine Learning Accelerator 2.3.5 by following the document <https://www.ibm.com/docs/en/wmla/2.3?topic=installation-install-upgrade&gt;
Then follow <https://ibmdocs-test.mybluemix.net/docs/en/cloud-paks/cp-data/4.5.x?topic=accelerator-upgrading&gt; to upgrade from WMLA 2.3.5 to WMLA 2.4.0

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmibm_watson_machine_learning_acceleratorMatch2.2.
OR
ibmibm_watson_machine_learning_acceleratorMatch2.3.
VendorProductVersionCPE
ibmibm_watson_machine_learning_accelerator2.2.cpe:2.3:a:ibm:ibm_watson_machine_learning_accelerator:2.2.:*:*:*:*:*:*:*
ibmibm_watson_machine_learning_accelerator2.3.cpe:2.3:a:ibm:ibm_watson_machine_learning_accelerator:2.3.:*:*:*:*:*:*:*

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

60.3%