Is DX NetOps affected by CVE-2022-22963 and CVE-2022-22965?
search cancel

Is DX NetOps affected by CVE-2022-22963 and CVE-2022-22965?

book

Article ID: 238310

calendar_today

Updated On:

Products

DX NetOps CA Performance Management - Usage and Administration CA Virtual Network Assurance CA Spectrum CA Mediation Manager CA Network Flow Analysis (NetQos / NFA) DX Operational Intelligence

Issue/Introduction

Are there impacts to any of the DX NetOps component systems due to the new Spring4Shell zeroday exploits?

Are there impacts to any of the DX NetOps Performance Management systems due to the new Spring4Shell zeroday exploits?

Are there impacts to any of the DX NetOps Virtual Network Assurance systems due to the new Spring4Shell zeroday exploits?

Are there impacts to any of the DX NetOps Spectrum systems due to the new Spring4Shell zeroday exploits?

Are there impacts to any of the DX NetOps Mediation Manager systems due to the new Spring4Shell zeroday exploits?

Are there impacts to any of the DX NetOps Network Flow Analysis systems due to the new Spring4Shell zeroday exploits?

Are there impacts to any of the DX NetOps Operational Intelligence Connector systems due to the new Spring4Shell zeroday exploits?

Spring4Shell: New RCE vulnerability uncovered in Java framework

A new vulnerability in the Spring Core Java framework that could allow for unauthenticated remote code execution (RCE) on vulnerable applications was publicly disclosed yesterday (March 30), before a patch was issued.

Dubbed Spring4Shell (CVE-2022-22965), proof-of-concept exploit code was leaked on GitHub shortly after its discovery. This code was swiftly removed, but not before it was downloaded by several security researchers who confirmed the vulnerability. It was also reposted on various platforms, meaning it was available to the public, including malicious actors. BleepingComputer reported that it had been told Spring4Shell was being actively exploited in attacks prior to the release of a patch for the bug. 

In a blog this morning, Spring confirmed the bug and said it had been reported to it by researchers on Tuesday night (March 29). Spring has released Spring Framework 5.3.18 and 5.2.20, which it says address the vulnerability. Corresponding Spring Boot releases are in progress.


Spring Core is a popular application framework that allows software developers to quickly and easily develop Java applications with enterprise-level features. These applications can then be deployed on servers, such as Apache Tomcat, as stand-alone packages with all the required dependencies.


The bug allows an unauthenticated attacker to execute arbitrary code on a target system. There was some initial confusion about the severity of the bug, with it initially reported that all versions of Spring Core with the JDK version greater than or equal to 9.0 were vulnerable. However, researchers subsequently determined that it appears Spring Core
must be configured in a certain way to be vulnerable. Spring confirmed in its CVE report that certain prerequisites were required for the bug to be exploitable. 

Environment

TBD

We are actively working to determine the affected components and releases. Watch this space for additional information as it becomes available.

Last Update: 2022-04-01 @ 12:53 PM ET

Cause

A new vulnerability in the Spring Core Java framework that could allow for unauthenticated remote code execution (RCE) on vulnerable applications

Resolution

TBD

We are actively working to determine remediation steps for any components that may be impacted. Watch this space for additional information as it becomes available.

See the following Knowledge Base Articles for product-specific information: