Cyber Posture

CVE-2023-49886

CriticalRCE

Published: 06 October 2025

Published
06 October 2025
Modified
16 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0133 80.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2023-49886 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Ibm Transformation Extender Advanced. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 19.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely remediation and patching of the unsafe Java deserialization flaw.

prevent

Prevents exploitation by validating and sanitizing specially crafted inputs that trigger the deserialization vulnerability.

prevent

Limits remote unauthenticated access to the vulnerable endpoint by monitoring and controlling communications at system boundaries.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2023-49886 is an unauthenticated remote code execution vulnerability in a public-facing application via unsafe Java deserialization, directly enabling T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

IBM Standards Processing Engine 10.0.1.10 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe java deserialization. By sending specially crafted input, an attacker could exploit this vulnerability to execute arbitrary code on the…

more

system.

Deeper analysisAI

CVE-2023-49886 is an unsafe Java deserialization vulnerability (CWE-502) affecting IBM Standards Processing Engine version 10.0.1.10. Published on 2025-10-06, it enables a remote attacker to execute arbitrary code on the system by sending specially crafted input that triggers the deserialization flaw.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is highly severe and exploitable over the network with low complexity, no privileges, and no user interaction required. Any unauthenticated remote attacker can target exposed instances of the affected software to achieve full remote code execution, potentially compromising confidentiality, integrity, and availability.

Mitigation details are provided in the IBM security advisory at https://www.ibm.com/support/pages/node/7247179.

Details

CWE(s)

Affected Products

ibm
transformation extender advanced
10.0.1

CVEs Like This One

CVE-2025-36072Same vendor: Ibm
CVE-2025-2000Same vendor: Ibm
CVE-2024-49352Same vendor: Ibm
CVE-2026-1343Same vendor: Ibm
CVE-2025-14914Same vendor: Ibm
CVE-2025-36379Same vendor: Ibm
CVE-2025-1403Same vendor: Ibm
CVE-2026-1264Same vendor: Ibm
CVE-2025-33077Same vendor: Ibm
CVE-2025-0160Same vendor: Ibm

References