Learn about CVE-2020-4435 affecting IBM Aspera applications, allowing arbitrary memory corruption. Find out the impact, affected systems, exploitation details, and mitigation steps.
Certain IBM Aspera applications are vulnerable to arbitrary memory corruption, potentially leading to code execution or denial-of-service attacks through the http fallback service.
Understanding CVE-2020-4435
IBM Aspera applications are susceptible to arbitrary memory corruption, posing a risk of unauthorized code execution or DoS attacks.
What is CVE-2020-4435?
Vulnerability in IBM Aspera applications leading to arbitrary memory corruption
Exploitation could allow attackers to execute arbitrary code or conduct DoS attacks
The Impact of CVE-2020-4435
Attack Complexity: High
Attack Vector: Network
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: High
Privileges Required: Low
Exploit Code Maturity: Unproven
Remediation Level: Official Fix
Report Confidence: Confirmed
Technical Details of CVE-2020-4435
IBM Aspera applications are affected by arbitrary memory corruption, potentially enabling attackers to execute code or launch DoS attacks.
Vulnerability Description
Vulnerable to arbitrary memory corruption
Allows attackers with system knowledge to execute code or perform DoS attacks
Affected Systems and Versions
Aspera Transfer Cluster Manager 1.3.1
Aspera High-Speed Transfer Server 3.9.3
Aspera Shares On Demand 3.7.4
Aspera Application Platform On Demand 3.7.4
Aspera Proxy Server 1.4.3
Aspera Faspex On Demand 3.7.4
Aspera Server On Demand 3.7.4
Aspera High-Speed Transfer Server for Cloud Pak for Integration (CP4I) 3.9.10