ALERT: Some images may not load properly within the Knowledge Base Article. If you see a broken image, please right-click and select 'Open image in a new tab'. We apologize for this inconvenience.

Is Symantec VIP vulnerable to Spring framework CVE-2022-22965?

book

Article ID: 238614

calendar_today

Updated On:

Products

VIP Service

Issue/Introduction

Could you let us know if the Symantec VIP is vulnerable to CVE-2022-22965?

Environment

Release : 1.0

Component : VIP Service

Resolution

CVE-2022-22965 Detail :

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

These are the prerequisites for the exploit:

  • JDK 9 or higher
  • Apache Tomcat as the Servlet container
  • Packaged as WAR
  • spring-webmvc or spring-webflux dependency.

Symantec VIP Impact:

We have completed the analysis for VIP Enterprise Gateway and it is not vulnerable to CVE-2022-22965 or CVE-2022-22963.

Symantec VIP cloud components analysis is also complete and those components are not vulnerable either.

Additional Information

Symantec Security Advisory for Spring Framework CVE-2022-22965

CVE-2022-22965 Detail