Lucene search

K
f5F5F5:K13325942
HistoryNov 10, 2022 - 12:00 a.m.

K13325942 : Appliance mode iControl REST vulnerability CVE-2022-41800

2022-11-1000:00:00
my.f5.com
29
appliance mode
icontrol rest
vulnerability

AI Score

8.3

Confidence

High

EPSS

0.008

Percentile

81.9%

Security Advisory Description

When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. (CVE-2022-41800)

Impact

In Appliance mode, an authenticated user with valid user credentials assigned the Administrator role may be able to bypass Appliance mode restrictions. This is a control plane issue; there is no data plane exposure. Appliance mode is enforced by a specific license or may be enabled or disabled for individual Virtual Clustered Multiprocessing (vCMP) guest instances.

For more information about Appliance mode, refer to K12815: Overview of Appliance mode.