Lucene search

K
nvd[email protected]NVD:CVE-2023-22374
HistoryFeb 01, 2023 - 6:15 p.m.

CVE-2023-22374

2023-02-0118:15:11
CWE-134
web.nvd.nist.gov
5
icontrol soap
format string vulnerability
crash
execute code
security boundary crossing
big-ip appliance mode
authenticated attacker

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0.001

Percentile

43.7%

A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.
Β Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

Nvd
Node
f5big-ip_access_policy_managerRange14.1.4.6–14.1.5
OR
f5big-ip_access_policy_managerRange15.1.5.1–15.1.8
OR
f5big-ip_access_policy_managerRange16.1.2.2–16.1.3
OR
f5big-ip_access_policy_managerMatch13.1.5
OR
f5big-ip_access_policy_managerMatch17.0.0
OR
f5big-ip_advanced_firewall_managerRange14.1.4.6–14.1.5
OR
f5big-ip_advanced_firewall_managerRange15.1.5.1–15.1.8
OR
f5big-ip_advanced_firewall_managerRange16.1.2.2–16.1.3
OR
f5big-ip_advanced_firewall_managerMatch13.1.5
OR
f5big-ip_advanced_firewall_managerMatch17.0.0
OR
f5big-ip_analyticsRange14.1.4.6–14.1.5
OR
f5big-ip_analyticsRange15.1.5.1–15.1.8
OR
f5big-ip_analyticsRange16.1.2.2–16.1.3
OR
f5big-ip_analyticsMatch13.1.5
OR
f5big-ip_analyticsMatch17.0.0
OR
f5big-ip_application_acceleration_managerRange15.1.5.1–15.1.8
OR
f5big-ip_application_acceleration_managerRange16.1.2.2–16.1.3
OR
f5big-ip_application_acceleration_managerMatch13.1.5
OR
f5big-ip_application_acceleration_managerMatch17.0.0
OR
f5big-ip_application_security_managerRange14.1.4.6–14.1.5
OR
f5big-ip_application_security_managerRange15.1.5.1–15.1.8
OR
f5big-ip_application_security_managerRange16.1.2.2–16.1.3
OR
f5big-ip_application_security_managerMatch13.1.0
OR
f5big-ip_application_security_managerMatch17.0.0
OR
f5big-ip_ddos_hybrid_defenderRange14.1.4.6–14.1.5
OR
f5big-ip_ddos_hybrid_defenderRange15.1.5.1–15.1.8
OR
f5big-ip_ddos_hybrid_defenderRange16.1.2.2–16.1.3
OR
f5big-ip_ddos_hybrid_defenderMatch13.1.5
OR
f5big-ip_domain_name_systemRange14.1.4.6–14.1.5
OR
f5big-ip_domain_name_systemRange15.1.5.1–15.1.8
OR
f5big-ip_domain_name_systemRange16.1.2.2–16.1.3
OR
f5big-ip_domain_name_systemMatch17.0.0
OR
f5big-ip_fraud_protection_serviceRange15.1.5.1–15.1.8
OR
f5big-ip_fraud_protection_serviceRange16.1.2.2–16.1.3
OR
f5big-ip_fraud_protection_serviceMatch13.1.5
OR
f5big-ip_fraud_protection_serviceMatch17.0.0
OR
f5big-ip_link_controllerRange14.1.4.6–14.1.5
OR
f5big-ip_link_controllerRange15.1.5.1–15.1.8
OR
f5big-ip_link_controllerRange16.1.2.2–16.1.3
OR
f5big-ip_link_controllerMatch13.1.5
OR
f5big-ip_link_controllerMatch17.0.0
OR
f5big-ip_local_traffic_managerRange14.1.4.6–14.1.5
OR
f5big-ip_local_traffic_managerRange15.1.5.1–15.1.8
OR
f5big-ip_local_traffic_managerRange16.1.2.2–16.1.3
OR
f5big-ip_local_traffic_managerMatch13.1.5
OR
f5big-ip_local_traffic_managerMatch17.0.0
OR
f5big-ip_policy_enforcement_managerRange14.1.4.6–14.1.5
OR
f5big-ip_policy_enforcement_managerRange15.1.5.1–15.1.8
OR
f5big-ip_policy_enforcement_managerRange16.1.2.2–16.1.3
OR
f5big-ip_policy_enforcement_managerMatch13.1.5
OR
f5big-ip_policy_enforcement_managerMatch17.0.0
OR
f5big-ip_ssl_orchestratorRange14.1.4.6–14.1.5
OR
f5big-ip_ssl_orchestratorRange15.1.5.1–15.1.8
OR
f5big-ip_ssl_orchestratorRange16.1.2.2–16.1.3
OR
f5big-ip_ssl_orchestratorMatch13.1.5
OR
f5big-ip_ssl_orchestratorMatch17.0.0
VendorProductVersionCPE
f5big-ip_access_policy_manager*cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
f5big-ip_access_policy_manager13.1.5cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*
f5big-ip_access_policy_manager17.0.0cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager13.1.5cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager17.0.0cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*
f5big-ip_analytics*cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
f5big-ip_analytics13.1.5cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*
f5big-ip_analytics17.0.0cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*
f5big-ip_application_acceleration_manager*cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 341

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0.001

Percentile

43.7%