Impact of CVE-2022-22965 SpringShell Vulnerability on Data Insight

Article: 100052804
Last Published: 2026-01-08
Ratings: 1 0
Product(s): Data Insight

Description

CVE-2022-22965: Spring Core Remote Code Execution Vulnerability Exploited In the Wild (SpringShell) 

Severity: Critical 

Base CVSS Score: 10.0 

The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild. The exploitation of this vulnerability could result in a web shell being installed onto the compromised server that allows further command execution. 

 

Impact 

As reported in the Spring Framework RCE - Early Announcement article, the vulnerability can only be exploited for when JDK versions 9 or higher. Data Insight (all versions) internally uses Spring Framework in conjunction with JDK versions lower than Version 9, moreover it doesn’t use Spring MVC.  

All versions of Data Insight are unaffected by this vulnerability and hence no mitigation is required. 

 

Questions

For questions or problems regarding these vulnerabilities please contact Veritas Technical Support (https://www.veritas.com/support

  

Disclaimer

THE SECURITY ADVISORY IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. 

Was this content helpful?