Lucene search

K
cve[email protected]CVE-2022-35272
HistoryAug 04, 2022 - 6:15 p.m.

CVE-2022-35272

2022-08-0418:15:10
CWE-404
web.nvd.nist.gov
37
4
cve-2022-35272
big-ip
security vulnerability
tmm
http
mrf
eots

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

In BIG-IP Versions 17.0.x before 17.0.0.1 and 16.1.x before 16.1.3.1, when source-port preserve-strict is configured on an HTTP Message Routing Framework (MRF) virtual server, undisclosed traffic may cause the Traffic Management Microkernel (TMM) to produce a core file and the connection to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

NVD
Node
f5big-ip_access_policy_managerRange16.1.016.1.3.1
OR
f5big-ip_access_policy_managerMatch17.0.0
OR
f5big-ip_advanced_firewall_managerRange16.1.016.1.3.1
OR
f5big-ip_advanced_firewall_managerMatch17.0.0
OR
f5big-ip_analyticsRange16.1.016.1.3.1
OR
f5big-ip_analyticsMatch17.0.0
OR
f5big-ip_application_acceleration_managerRange16.1.016.1.3.1
OR
f5big-ip_application_acceleration_managerMatch17.0.0
OR
f5big-ip_application_security_managerRange16.1.016.1.3.1
OR
f5big-ip_application_security_managerMatch17.0.0
OR
f5big-ip_domain_name_systemRange16.1.016.1.3.1
OR
f5big-ip_domain_name_systemMatch17.0.0
OR
f5big-ip_fraud_protection_serviceRange16.1.016.1.3.1
OR
f5big-ip_fraud_protection_serviceMatch17.0.0
OR
f5big-ip_global_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_global_traffic_managerMatch17.0.0
OR
f5big-ip_link_controllerRange16.1.016.1.3.1
OR
f5big-ip_link_controllerMatch17.0.0
OR
f5big-ip_local_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_local_traffic_managerMatch17.0.0
OR
f5big-ip_policy_enforcement_managerRange16.1.016.1.3.1
OR
f5big-ip_policy_enforcement_managerMatch17.0.0

CNA Affected

[
  {
    "product": "BIG-IP",
    "vendor": "F5",
    "versions": [
      {
        "lessThan": "13.1.x*",
        "status": "unaffected",
        "version": "13.1.0",
        "versionType": "custom"
      },
      {
        "lessThan": "14.1.x*",
        "status": "unaffected",
        "version": "14.1.0",
        "versionType": "custom"
      },
      {
        "lessThan": "15.1.x*",
        "status": "unaffected",
        "version": "15.1.0",
        "versionType": "custom"
      },
      {
        "lessThan": "16.1.3.1",
        "status": "affected",
        "version": "16.1.x",
        "versionType": "custom"
      },
      {
        "lessThan": "17.0.0.1",
        "status": "affected",
        "version": "17.0.x",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Related for CVE-2022-35272