Lucene search

K
nvd[email protected]NVD:CVE-2022-33968
HistoryAug 04, 2022 - 6:15 p.m.

CVE-2022-33968

2022-08-0418:15:09
CWE-125
web.nvd.nist.gov
6
big-ip
vulnerability
ltm monitor
apm sso
buffer over-read
ntlm challenge-response

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

28.4%

In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, when an LTM monitor or APM SSO is configured on a virtual server, and NTLM challenge-response is in use, undisclosed traffic can cause a buffer over-read. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

Nvd
Node
f5big-ip_access_policy_managerRange13.1.013.1.5
OR
f5big-ip_access_policy_managerRange14.1.014.1.5.1
OR
f5big-ip_access_policy_managerRange15.1.015.1.6.1
OR
f5big-ip_access_policy_managerRange16.1.016.1.3.1
OR
f5big-ip_access_policy_managerMatch17.0.0
OR
f5big-ip_advanced_firewall_managerRange13.1.013.1.5
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.5.1
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.6.1
OR
f5big-ip_advanced_firewall_managerRange16.1.016.1.3.1
OR
f5big-ip_advanced_firewall_managerMatch17.0.0
OR
f5big-ip_analyticsRange13.1.013.1.5
OR
f5big-ip_analyticsRange14.1.014.1.5.1
OR
f5big-ip_analyticsRange15.1.015.1.6.1
OR
f5big-ip_analyticsRange16.1.016.1.3.1
OR
f5big-ip_analyticsMatch17.0.0
OR
f5big-ip_application_acceleration_managerRange13.1.013.1.5
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.5.1
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.6.1
OR
f5big-ip_application_acceleration_managerRange16.1.016.1.3.1
OR
f5big-ip_application_acceleration_managerMatch17.0.0
OR
f5big-ip_application_security_managerRange13.1.013.1.5
OR
f5big-ip_application_security_managerRange14.1.014.1.5.1
OR
f5big-ip_application_security_managerRange15.1.015.1.6.1
OR
f5big-ip_application_security_managerRange16.1.016.1.3.1
OR
f5big-ip_application_security_managerMatch17.0.0
OR
f5big-ip_domain_name_systemRange13.1.013.1.5
OR
f5big-ip_domain_name_systemRange14.1.014.1.5.1
OR
f5big-ip_domain_name_systemRange15.1.015.1.6.1
OR
f5big-ip_domain_name_systemRange16.1.016.1.3.1
OR
f5big-ip_domain_name_systemMatch17.0.0
OR
f5big-ip_fraud_protection_serviceRange13.1.013.1.5
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.5.1
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.6.1
OR
f5big-ip_fraud_protection_serviceRange16.1.016.1.3.1
OR
f5big-ip_fraud_protection_serviceMatch17.0.0
OR
f5big-ip_global_traffic_managerRange13.1.013.1.5
OR
f5big-ip_global_traffic_managerRange14.1.014.1.5.1
OR
f5big-ip_global_traffic_managerRange15.1.015.1.6.1
OR
f5big-ip_global_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_global_traffic_managerMatch17.0.0
OR
f5big-ip_link_controllerRange13.1.013.1.5
OR
f5big-ip_link_controllerRange14.1.014.1.5.1
OR
f5big-ip_link_controllerRange15.1.015.1.6.1
OR
f5big-ip_link_controllerRange16.1.016.1.3.1
OR
f5big-ip_link_controllerMatch17.0.0
OR
f5big-ip_local_traffic_managerRange13.1.013.1.5
OR
f5big-ip_local_traffic_managerRange14.1.014.1.5.1
OR
f5big-ip_local_traffic_managerRange15.1.015.1.6.1
OR
f5big-ip_local_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_local_traffic_managerMatch17.0.0
OR
f5big-ip_policy_enforcement_managerRange13.1.013.1.5
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.5.1
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.6.1
OR
f5big-ip_policy_enforcement_managerRange16.1.016.1.3.1
OR
f5big-ip_policy_enforcement_managerMatch17.0.0
VendorProductVersionCPE
f5big-ip_access_policy_manager*cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
f5big-ip_access_policy_manager17.0.0cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager17.0.0cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*
f5big-ip_analytics*cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
f5big-ip_analytics17.0.0cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*
f5big-ip_application_acceleration_manager*cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
f5big-ip_application_acceleration_manager17.0.0cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*
f5big-ip_application_security_manager*cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
f5big-ip_application_security_manager17.0.0cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 221

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

28.4%

Related for NVD:CVE-2022-33968