Lucene search

K
cveF5CVE-2022-34651
HistoryAug 04, 2022 - 6:15 p.m.

CVE-2022-34651

2022-08-0418:15:10
CWE-476
f5
web.nvd.nist.gov
56
4
cve-2022-34651
big-ip
vulnerability
ssl
tmm
ltm
http
tls 1.3
security

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

38.4%

In BIG-IP Versions 16.1.x before 16.1.3.1 and 15.1.x before 15.1.6.1, when an LTM Client or Server SSL profile with TLS 1.3 enabled is configured on a virtual server, along with an iRule that calls HTTP::respond, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

Nvd
Node
f5big-ip_access_policy_managerRange15.1.015.1.6.1
OR
f5big-ip_access_policy_managerRange16.1.016.1.3.1
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.6.1
OR
f5big-ip_advanced_firewall_managerRange16.1.016.1.3.1
OR
f5big-ip_analyticsRange15.1.015.1.6.1
OR
f5big-ip_analyticsRange16.1.016.1.3.1
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.6.1
OR
f5big-ip_application_acceleration_managerRange16.1.016.1.3.1
OR
f5big-ip_application_security_managerRange15.1.015.1.6.1
OR
f5big-ip_application_security_managerRange16.1.016.1.3.1
OR
f5big-ip_domain_name_systemRange15.1.015.1.6.1
OR
f5big-ip_domain_name_systemRange16.1.016.1.3.1
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.6.1
OR
f5big-ip_fraud_protection_serviceRange16.1.016.1.3.1
OR
f5big-ip_global_traffic_managerRange15.1.015.1.6.1
OR
f5big-ip_global_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_link_controllerRange15.1.015.1.6.1
OR
f5big-ip_link_controllerRange16.1.016.1.3.1
OR
f5big-ip_local_traffic_managerRange15.1.015.1.6.1
OR
f5big-ip_local_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.6.1
OR
f5big-ip_policy_enforcement_managerRange16.1.016.1.3.1
VendorProductVersionCPE
f5big-ip_access_policy_manager*cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
f5big-ip_analytics*cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
f5big-ip_application_acceleration_manager*cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
f5big-ip_application_security_manager*cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
f5big-ip_domain_name_system*cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
f5big-ip_fraud_protection_service*cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
f5big-ip_global_traffic_manager*cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
f5big-ip_link_controller*cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
f5big-ip_local_traffic_manager*cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 111

CNA Affected

[
  {
    "product": "BIG-IP",
    "vendor": "F5",
    "versions": [
      {
        "lessThan": "13.1.x*",
        "status": "unaffected",
        "version": "13.1.0",
        "versionType": "custom"
      },
      {
        "lessThan": "14.1.x*",
        "status": "unaffected",
        "version": "14.1.0",
        "versionType": "custom"
      },
      {
        "lessThan": "15.1.6.1",
        "status": "affected",
        "version": "15.1.x",
        "versionType": "custom"
      },
      {
        "lessThan": "16.1.3.1",
        "status": "affected",
        "version": "16.1.x",
        "versionType": "custom"
      },
      {
        "lessThan": "17.0.x*",
        "status": "unaffected",
        "version": "17.0.0",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

38.4%

Related for CVE-2022-34651