PatchSiren

PatchSiren cyber security CVE debrief

CVE-2020-28949 PEAR CVE debrief

CVE-2020-28949 affects PEAR Archive_Tar and is listed in CISA’s Known Exploited Vulnerabilities catalog. Based on the supplied corpus, the safe defensive posture is to treat affected deployments as urgent remediation items, especially where Archive_Tar processes untrusted archive content.

Vendor
PEAR
Product
Archive_Tar
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-08-25
Original CVE updated
2022-08-25
Advisory published
2022-08-25
Advisory updated
2022-08-25

Who should care

Administrators and developers who maintain systems using PEAR Archive_Tar, as well as security teams responsible for vulnerability management, dependency tracking, and remediation of internet-facing or archive-processing applications.

Technical summary

The supplied record describes a deserialization of untrusted data vulnerability in PEAR Archive_Tar. In practical terms, any application that accepts attacker-controlled archive content through this component should be reviewed and updated according to vendor guidance, because untrusted deserialization can create serious security exposure.

Defensive priority

Urgent

Recommended defensive actions

  • Apply updates per vendor instructions for PEAR Archive_Tar.
  • Inventory all applications and systems that depend on PEAR Archive_Tar, including indirect dependencies.
  • Prioritize remediation for internet-facing services and any workflow that processes untrusted archive files.
  • Verify that the vulnerable component is no longer deployed after remediation.
  • Use the official CVE and CISA KEV references to track remediation status in your vulnerability management program.

Evidence notes

The supplied CISA KEV metadata identifies this issue as "PEAR Archive_Tar Deserialization of Untrusted Data Vulnerability," marks it as a known exploited vulnerability, and records dateAdded as 2022-08-25 with dueDate as 2022-09-15. The corpus also provides official CVE and NVD links, but no additional technical detail beyond the deserialization description.

Official resources

The supplied corpus lists CVE-2020-28949 as published and modified on 2022-08-25. CISA’s KEV metadata in the corpus also uses 2022-08-25 as the dateAdded value and 2022-09-15 as the dueDate.