Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2023-0265
Vulnerability from csaf_certbund
Published
2023-02-01 23:00
Modified
2023-06-28 22:00
Summary
F5 BIG-IP: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
F5 FirePass ist ein SSL-VPN Gateway der F5 Corporation. Die BIG-IP ist eine Netzwerk Appliance auf der die meisten F5 Produkte laufen.
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in F5 BIG-IP ausnutzen, um seine Privilegien zu erhöhen, Code zur Ausführung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen.
Betroffene Betriebssysteme
- F5 Networks
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "F5 FirePass ist ein SSL-VPN Gateway der F5 Corporation. Die BIG-IP ist eine Netzwerk Appliance auf der die meisten F5 Produkte laufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in F5 BIG-IP ausnutzen, um seine Privilegien zu erh\u00f6hen, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- F5 Networks", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0265 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0265.json" }, { "category": "self", "summary": "WID-SEC-2023-0265 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0265" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-06-28", "url": "https://my.f5.com/manage/s/article/K83284425" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K000130496" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K000130415" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K07143733" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K08182564" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K17542533" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K20717585" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K24572686" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K34525368" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K37708118" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K43881487" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K46048342" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K56412001" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K56676554" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K76964818" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K83284425" }, { "category": "external", "summary": "F5 Security Advisory vom 2023-02-01", "url": "https://my.f5.com/manage/s/article/K95503300" } ], "source_lang": "en-US", "title": "F5 BIG-IP: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-28T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:42:56.693+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0265", "initial_release_date": "2023-02-01T23:00:00.000+00:00", "revision_history": [ { "date": "2023-02-01T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-28T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von F5 aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP \u003c 17.0.0.2", "product": { "name": "F5 BIG-IP \u003c 17.0.0.2", "product_id": "T026108", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:17.0.0.2" } } }, { "category": "product_name", "name": "F5 BIG-IP \u003c 16.1.3.3", "product": { "name": "F5 BIG-IP \u003c 16.1.3.3", "product_id": "T026109", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:16.1.3.3" } } }, { "category": "product_name", "name": "F5 BIG-IP \u003c 14.1.5.3", "product": { "name": "F5 BIG-IP \u003c 14.1.5.3", "product_id": "T026111", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:14.1.5.3" } } }, { "category": "product_name", "name": "F5 BIG-IP \u003c 15.1.8.1", "product": { "name": "F5 BIG-IP \u003c 15.1.8.1", "product_id": "T026112", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:15.1.8.1" } } }, { "category": "product_name", "name": "F5 BIG-IP \u003c 17.1.0", "product": { "name": "F5 BIG-IP \u003c 17.1.0", "product_id": "T027101", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:17.1.0" } } } ], "category": "product_name", "name": "BIG-IP" } ], "category": "vendor", "name": "F5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-23555", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-23555" }, { "cve": "CVE-2023-23552", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-23552" }, { "cve": "CVE-2023-22842", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22842" }, { "cve": "CVE-2023-22839", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22839" }, { "cve": "CVE-2023-22664", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22664" }, { "cve": "CVE-2023-22422", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22422" }, { "cve": "CVE-2023-22418", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22418" }, { "cve": "CVE-2023-22374", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22374" }, { "cve": "CVE-2023-22358", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22358" }, { "cve": "CVE-2023-22341", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22341" }, { "cve": "CVE-2023-22340", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22340" }, { "cve": "CVE-2023-22326", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22326" }, { "cve": "CVE-2023-22323", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22323" }, { "cve": "CVE-2023-22302", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22302" }, { "cve": "CVE-2023-22283", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22283" }, { "cve": "CVE-2023-22281", "notes": [ { "category": "description", "text": "In F5 BIG-IP existieren mehrere Schwachstellen. Ein Angreifer kann diese Sschwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen und einen Denial of Service zu verursachen. Zur Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Opfers notwendig." } ], "release_date": "2023-02-01T23:00:00.000+00:00", "title": "CVE-2023-22281" } ] }
cve-2023-22374
Vulnerability from cvelistv5
Published
2023-02-01 17:54
Modified
2024-08-02 10:07
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
8.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
8.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS score ?
Summary
A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.534Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K000130415" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "All Modules" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "changes": [ { "at": "Engineering Hotfix Available", "status": "unaffected" } ], "lessThan": "17.1.0", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "changes": [ { "at": "Engineering Hotfix Available", "status": "unaffected" } ], "lessThan": "16.1.3.4", "status": "affected", "version": "16.1.2.2", "versionType": "semver" }, { "changes": [ { "at": "Engineering Hotfix Available", "status": "unaffected" } ], "lessThan": "15.1.8.2", "status": "affected", "version": "15.1.5.1", "versionType": "semver" }, { "changes": [ { "at": "Engineering Hotfix Available", "status": "unaffected" } ], "lessThan": "14.1.5.4", "status": "affected", "version": "14.1.4.6", "versionType": "semver" }, { "changes": [ { "at": "Engineering Hotfix Available", "status": "unaffected" } ], "lessThan": "*", "status": "affected", "version": "13.1.5", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention and following the highest standards of coordinated disclosure." } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\u003c/span\u003e\n\u0026nbsp;Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e\n\n" } ], "value": "\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\n\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "Appliance Mode" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134 Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-04T02:11:45.387Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K000130415" } ], "source": { "discovery": "EXTERNAL" }, "title": "iControl SOAP vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22374", "datePublished": "2023-02-01T17:54:46.798Z", "dateReserved": "2023-01-13T06:43:37.145Z", "dateUpdated": "2024-08-02T10:07:06.534Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22422
Vulnerability from cvelistv5
Published
2023-02-01 17:55
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, when a HTTP profile with the non-default Enforcement options of Enforce HTTP Compliance and Unknown Methods: Reject are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K43881487" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "All modules" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, when a HTTP profile with the non-default Enforcement options of \u003cb\u003eEnforce HTTP Compliance\u003c/b\u003e and \u003cb\u003eUnknown Methods: Reject\u003c/b\u003e are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, when a HTTP profile with the non-default Enforcement options of Enforce HTTP Compliance and Unknown Methods: Reject are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:55:51.536Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K43881487" } ], "source": { "discovery": "INTERNAL" }, "title": "HTTP profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22422", "datePublished": "2023-02-01T17:55:51.536Z", "dateReserved": "2023-01-13T06:43:37.206Z", "dateUpdated": "2024-08-02T10:07:06.646Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23552
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:35
Severity ?
EPSS score ?
Summary
On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:32.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K17542533" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "ASM", "Advanced WAF" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:56:47.576Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K17542533" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP Advanced WAF and ASM vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-23552", "datePublished": "2023-02-01T17:56:47.576Z", "dateReserved": "2023-01-13T06:43:37.181Z", "dateUpdated": "2024-08-02T10:35:32.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22664
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, and BIG-IP SPK starting in version 1.6.0, when a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | F5 | BIG-IP |
Version: 17.0.0 ≤ Version: 16.1.0 ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:49.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K56676554" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "All modules" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" } ] }, { "defaultStatus": "unknown", "product": "BIG-IP SPK", "vendor": "F5", "versions": [ { "lessThan": "*", "status": "affected", "version": "1.6.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, and BIG-IP SPK starting in version 1.6.0, when a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, and BIG-IP SPK starting in version 1.6.0, when a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:56:15.585Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K56676554" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP HTTP/2 profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22664", "datePublished": "2023-02-01T17:56:15.585Z", "dateReserved": "2023-01-13T06:43:37.176Z", "dateUpdated": "2024-08-02T10:13:49.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22418
Vulnerability from cvelistv5
Published
2023-02-01 17:55
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.7, 14.1.x before 14.1.5.3, and all versions of 13.1.x, an open redirect vulnerability exists on virtual servers enabled with a BIG-IP APM access policy. This vulnerability allows an unauthenticated malicious attacker to build an open redirect URI. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K95503300" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "APM" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.7", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.7, 14.1.x before 14.1.5.3, and all versions of 13.1.x, an open redirect vulnerability exists on virtual servers enabled with a BIG-IP APM access policy. This vulnerability allows an unauthenticated malicious attacker to build an open redirect URI. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.7, 14.1.x before 14.1.5.3, and all versions of 13.1.x, an open redirect vulnerability exists on virtual servers enabled with a BIG-IP APM access policy. This vulnerability allows an unauthenticated malicious attacker to build an open redirect URI. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:55:14.224Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K95503300" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP APM virtual server vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22418", "datePublished": "2023-02-01T17:55:14.224Z", "dateReserved": "2023-01-13T06:43:46.170Z", "dateUpdated": "2024-08-02T10:07:06.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22341
Vulnerability from cvelistv5
Published
2023-02-01 17:54
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
On version 14.1.x before 14.1.5.3, and all versions of 13.1.x, when the BIG-IP APM system is configured with all the following elements, undisclosed requests may cause the Traffic Management Microkernel (TMM) to terminate:
* An OAuth Server that references an OAuth Provider
* An OAuth profile with the Authorization Endpoint set to '/'
* An access profile that references the above OAuth profile and is associated with an HTTPS virtual server
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K20717585" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "APM" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eOn version 14.1.x before 14.1.5.3, and all versions of 13.1.x, when the BIG-IP APM system is configured with all the following elements, undisclosed requests may cause the Traffic Management Microkernel (TMM) to terminate:\u003c/p\u003e\u003cul\u003e\u003cli\u003eAn OAuth Server that references an OAuth Provider\u003c/li\u003e\u003cli\u003eAn OAuth profile with the Authorization Endpoint set to \u0027/\u0027\u003c/li\u003e\u003cli\u003eAn access profile that references the above OAuth profile and is associated with an HTTPS virtual server \u003c/li\u003e\u003c/ul\u003eNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e\n\n" } ], "value": "On version 14.1.x before 14.1.5.3, and all versions of 13.1.x, when the BIG-IP APM system is configured with all the following elements, undisclosed requests may cause the Traffic Management Microkernel (TMM) to terminate:\n\n * An OAuth Server that references an OAuth Provider\n * An OAuth profile with the Authorization Endpoint set to \u0027/\u0027\n * An access profile that references the above OAuth profile and is associated with an HTTPS virtual server \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:54:17.997Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K20717585" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP APM OAuth vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22341", "datePublished": "2023-02-01T17:54:17.997Z", "dateReserved": "2023-01-13T06:43:37.170Z", "dateUpdated": "2024-08-02T10:07:06.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23555
Vulnerability from cvelistv5
Published
2023-02-01 17:57
Modified
2024-08-02 10:35
Severity ?
EPSS score ?
Summary
On BIG-IP Virtual Edition versions 15.1x beginning in 15.1.4 to before 15.1.8 and 14.1.x beginning in 14.1.5 to before 14.1.5.3, and BIG-IP SPK beginning in 1.5.0 to before 1.6.0, when FastL4 profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | F5 | BIG-IP |
Version: 15.1.4 ≤ Version: 14.1.5 ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K24572686" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "All modules" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "15.1.8", "status": "affected", "version": "15.1.4", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.5", "versionType": "semver" } ] }, { "defaultStatus": "unknown", "product": "BIG-IP SPK", "vendor": "F5", "versions": [ { "lessThan": "1.6.0", "status": "affected", "version": "1.5.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On BIG-IP Virtual Edition versions 15.1x beginning in 15.1.4 to before 15.1.8 and 14.1.x beginning in 14.1.5 to before 14.1.5.3, and BIG-IP SPK beginning in 1.5.0 to before 1.6.0, when FastL4 profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On BIG-IP Virtual Edition versions 15.1x beginning in 15.1.4 to before 15.1.8 and 14.1.x beginning in 14.1.5 to before 14.1.5.3, and BIG-IP SPK beginning in 1.5.0 to before 1.6.0, when FastL4 profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "CWE-665 Improper Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:57:02.731Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K24572686" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP Virtual Edition vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-23555", "datePublished": "2023-02-01T17:57:02.731Z", "dateReserved": "2023-01-13T06:43:46.147Z", "dateUpdated": "2024-08-02T10:35:33.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22839
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K37708118" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "DNS", "LTM enabled with DNS Services license" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8.1", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:56:26.064Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K37708118" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP DNS profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22839", "datePublished": "2023-02-01T17:56:26.064Z", "dateReserved": "2023-01-13T06:43:46.141Z", "dateUpdated": "2024-08-02T10:20:31.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22842
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:30.781Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K08182564" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "All modules" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8.1", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:56:36.634Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K08182564" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP SIP profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22842", "datePublished": "2023-02-01T17:56:36.634Z", "dateReserved": "2023-01-13T06:43:37.199Z", "dateUpdated": "2024-08-02T10:20:30.781Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22340
Vulnerability from cvelistv5
Published
2023-02-01 17:54
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:05.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K34525368" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "All modules" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:54:06.566Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K34525368" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP SIP profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22340", "datePublished": "2023-02-01T17:54:06.566Z", "dateReserved": "2023-01-13T06:43:37.186Z", "dateUpdated": "2024-08-02T10:07:05.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22302
Vulnerability from cvelistv5
Published
2023-02-01 17:53
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
In BIG-IP versions 17.0.x before 17.0.0.2, and 16.1.x beginning in 16.1.2.2 to before 16.1.3.3, when an HTTP profile is configured on a virtual server and conditions beyond the attacker’s control exist on the target pool member, undisclosed requests sent to the BIG-IP system can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:05.929Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K58550078" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "All modules" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.2.2", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In BIG-IP versions 17.0.x before 17.0.0.2, and 16.1.x beginning in 16.1.2.2 to before 16.1.3.3, when an HTTP profile is configured on a virtual server and conditions beyond the attacker\u2019s control exist on the target pool member, undisclosed requests sent to the BIG-IP system can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "In BIG-IP versions 17.0.x before 17.0.0.2, and 16.1.x beginning in 16.1.2.2 to before 16.1.3.3, when an HTTP profile is configured on a virtual server and conditions beyond the attacker\u2019s control exist on the target pool member, undisclosed requests sent to the BIG-IP system can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-772", "description": "CWE-772 Missing Release of Resource after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:53:19.320Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K58550078" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP HTTP profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22302", "datePublished": "2023-02-01T17:53:19.320Z", "dateReserved": "2023-01-13T06:43:46.174Z", "dateUpdated": "2024-08-02T10:07:05.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22283
Vulnerability from cvelistv5
Published
2023-02-01 17:52
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F5 | APM Clients |
Version: 7.1.5 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K07143733" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "APM Clients", "vendor": "F5", "versions": [ { "lessThan": "7.2.3.1", "status": "affected", "version": "7.1.5", "versionType": "semver" }, { "lessThan": "*", "status": "unaffected", "version": "7.2.4", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-03T23:52:40.793Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K07143733" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP Edge Client for Windows vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22283", "datePublished": "2023-02-01T17:52:57.233Z", "dateReserved": "2023-01-13T06:43:46.165Z", "dateUpdated": "2024-08-02T10:07:06.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22281
Vulnerability from cvelistv5
Published
2023-02-01 17:52
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP AFM NAT policy with a destination NAT rule is configured on a FastL4 virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:05.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K46048342" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "AFM" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP AFM NAT policy with a destination NAT rule is configured on a FastL4 virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP AFM NAT policy with a destination NAT rule is configured on a FastL4 virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-908", "description": "CWE-908 Use of Uninitialized Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:52:27.603Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K46048342" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP AFM vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22281", "datePublished": "2023-02-01T17:52:27.603Z", "dateReserved": "2023-01-13T06:43:37.165Z", "dateUpdated": "2024-08-02T10:07:05.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22358
Vulnerability from cvelistv5
Published
2023-02-01 17:54
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
In versions beginning with 7.2.2 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client Windows Installer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F5 | APM Clients |
Version: 7.2.2 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.328Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K76964818" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "APM Clients", "vendor": "F5", "versions": [ { "lessThan": "7.2.3.1", "status": "affected", "version": "7.2.2", "versionType": "semver" }, { "lessThan": "*", "status": "unaffected", "version": "7.2.4", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In versions beginning with 7.2.2 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client Windows Installer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "In versions beginning with 7.2.2 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client Windows Installer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:54:31.501Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K76964818" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP Edge Client for Windows vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22358", "datePublished": "2023-02-01T17:54:31.501Z", "dateReserved": "2023-01-13T06:43:46.155Z", "dateUpdated": "2024-08-02T10:07:06.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22323
Vulnerability from cvelistv5
Published
2023-02-01 17:53
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
In BIP-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when OCSP authentication profile is configured on a virtual server, undisclosed requests can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:05.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K56412001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "All modules" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8.1", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In BIP-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when OCSP authentication profile is configured on a virtual server, undisclosed requests can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "In BIP-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when OCSP authentication profile is configured on a virtual server, undisclosed requests can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:53:34.262Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K56412001" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP SSL OCSP Authentication profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22323", "datePublished": "2023-02-01T17:53:34.262Z", "dateReserved": "2023-01-13T06:43:37.159Z", "dateUpdated": "2024-08-02T10:07:05.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22326
Vulnerability from cvelistv5
Published
2023-02-01 17:53
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
In BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, and all versions of BIG-IQ 8.x and 7.1.x, incorrect permission assignment vulnerabilities exist in the iControl REST and TMOS shell (tmsh) dig command which may allow an authenticated attacker with resource administrator or administrator role privileges to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | F5 | BIG-IP |
Version: 17.0.0 ≤ Version: 16.1.0 ≤ Version: 15.1.0 ≤ Version: 14.1.0 ≤ Version: 13.1.0 ≤ |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K83284425" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "All modules" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8.1", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] }, { "defaultStatus": "unknown", "product": "BIG-IQ Centralized Management", "vendor": "F5", "versions": [ { "lessThan": "*", "status": "affected", "version": "8.0.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "7.1.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "F5 acknowledges Guillaume Goessel of Aon\u2019s Cyber Labs for bringing this issue to our attention and following the highest standards of coordinated disclosure." } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cb\u003e\u003c/b\u003eIn BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, and all versions of BIG-IQ 8.x and 7.1.x, incorrect permission assignment vulnerabilities exist in the iControl REST and TMOS shell (\u003cb\u003etmsh\u003c/b\u003e) dig command which may allow an authenticated attacker with resource administrator or administrator role privileges to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "In BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, and all versions of BIG-IQ 8.x and 7.1.x, incorrect permission assignment vulnerabilities exist in the iControl REST and TMOS shell (tmsh) dig command which may allow an authenticated attacker with resource administrator or administrator role privileges to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:53:45.327Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K83284425" } ], "source": { "discovery": "EXTERNAL" }, "title": "iControl REST and tmsh vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22326", "datePublished": "2023-02-01T17:53:45.327Z", "dateReserved": "2023-01-13T06:43:46.180Z", "dateUpdated": "2024-08-02T10:07:06.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.