Lucene search

K
f5F5F5:K000130415
HistoryFeb 01, 2023 - 12:00 a.m.

K000130415 : iControl SOAP vulnerability CVE-2023-22374

2023-02-0100:00:00
my.f5.com
7
icontrol soap
authenticated attacker
security boundary
dos
cve-2023-22374
arbitrary code
appliance mode

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

43.7%

Security Advisory Description

A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary. (CVE-2023-22374)

Impact

This vulnerability may allow an authenticated attacker with network access to iControl SOAP through the BIG-IP management port and/or self IP addresses to cause a denial-of-service (DoS) on the iControl SOAP CGI process or potentially execute arbitrary system commands. To successfully exploit the command execution attack vector, the attacker must gather knowledge about the environment in which the vulnerable component exists. There is no data plane exposure; this is a control plane issue only. Appliance mode is enforced by a specific license or may be enabled or disabled for individual Virtual Clustered Multiprocessing (vCMP) guest instances. For more information about Appliance mode, refer to K12815: Overview of Appliance mode.

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

43.7%