On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K23605346 | Mitigation Vendor Advisory |
http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-05-05 10:15
Updated : 2023-01-24 08:08
NVD link : CVE-2022-1388
Mitre link : CVE-2022-1388
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
f5
- big-ip_domain_name_system
- big-ip_global_traffic_manager
- big-ip_link_controller
- big-ip_advanced_firewall_manager
- big-ip_application_security_manager
- big-ip_access_policy_manager
- big-ip_local_traffic_manager
- big-ip_application_acceleration_manager
- big-ip_analytics
- big-ip_policy_enforcement_manager
- big-ip_fraud_protection_service