On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K81952114 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-05-05 10:15
Updated : 2023-01-24 07:37
NVD link : CVE-2022-26415
Mitre link : CVE-2022-26415
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
f5
- big-ip_domain_name_system
- big-ip_global_traffic_manager
- big-ip_link_controller
- big-ip_advanced_firewall_manager
- big-ip_application_security_manager
- big-ip_access_policy_manager
- big-ip_local_traffic_manager
- big-ip_application_acceleration_manager
- big-ip_analytics
- big-ip_policy_enforcement_manager
- big-ip_fraud_protection_service