{
"result": "OK",
"data": {
"search": [
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "OSV:CVE-2022-41741",
"_score": 28.306286,
"_source": {
"lastseen": "2024-03-27T21:00:07",
"description": "NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The issue affects only NGINX products that are built with the ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.",
"cvss3": {
"exploitabilityScore": 1.8,
"cvssV3": {
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"baseScore": 7.8,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 5.9
},
"published": "2022-10-19T22:15:12",
"type": "osv",
"title": "CVE-2022-41741",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 3.1,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"baseScore": 4.3,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0",
"accessVector": "LOCAL",
"authentication": "SINGLE"
},
"impactScore": 6.4,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-41741"
],
"modified": "2024-03-06T12:28:02",
"id": "OSV:CVE-2022-41741",
"href": "https://osv.dev/vulnerability/CVE-2022-41741",
"cvss": {
"score": 4.3,
"vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"
},
"vhref": "https://vulners.com/osv/OSV:CVE-2022-41741"
},
"highlight": {
"affectedSoftware.version": [
"release-1.11.0",
"1.11.0"
],
"affectedSoftware.name": [
"nginx",
"nginx",
"nginx",
"nginx",
"nginx"
]
},
"sort": [
28.306286,
1666217712000
],
"flatDescription": "NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K000132765",
"_score": 27.858736,
"_source": {
"lastseen": "2024-03-27T18:15:15",
"description": "Security Advisory Description\n\n * [CVE-2022-4203]()\n\nA read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. The read buffer overrun might result in a crash which could lead to a denial of service attack. In theory it could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext) although we are not aware of any working exploit leading to memory contents disclosure as of the time of release of this advisory. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.\n\n * [CVE-2023-0216]()\n\nAn invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data.\n\n * [CVE-2023-0217]()\n\nAn invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack. The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3.\n\n * [CVE-2023-0401]()\n\nA NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data.\n\nImpact\n\nThere is no impact; F5 products are not affected by this vulnerability.\n\n",
"cvss3": {
"cvssV3": {
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"userInteraction": "NONE"
}
},
"published": "2023-02-27T00:00:00",
"type": "f5",
"title": "K000132765 : OpenSSL vulnerabilities CVE-2022-4203, CVE-2023-0216, CVE-2023-0217, and CVE-2023-0401",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 10.0,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"integrityImpact": "NONE",
"baseScore": 5.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-4203",
"CVE-2023-0216",
"CVE-2023-0217",
"CVE-2023-0401"
],
"modified": "2024-03-22T00:00:00",
"id": "F5:K000132765",
"href": "https://my.f5.com/manage/s/article/K000132765?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 5.0,
"vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"vhref": "https://vulners.com/f5/F5:K000132765"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
27.858736,
1677456000000
],
"flatDescription": "Security Advisory Description CVE-2022-4203 A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "OSV:CVE-2022-41742",
"_score": 27.851215,
"_source": {
"lastseen": "2024-03-27T21:00:07",
"description": "NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted audio or video file. The issue affects only NGINX products that are built with the module ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.",
"cvss3": {
"exploitabilityScore": 1.8,
"cvssV3": {
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"baseScore": 7.1,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 5.2
},
"published": "2022-10-19T22:15:12",
"type": "osv",
"title": "CVE-2022-41742",
"bulletinFamily": "software",
"cvss2": {
"severity": "LOW",
"exploitabilityScore": 3.1,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"integrityImpact": "NONE",
"baseScore": 3.2,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:P",
"version": "2.0",
"accessVector": "LOCAL",
"authentication": "SINGLE"
},
"impactScore": 4.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-41742"
],
"modified": "2024-03-06T12:27:55",
"id": "OSV:CVE-2022-41742",
"href": "https://osv.dev/vulnerability/CVE-2022-41742",
"cvss": {
"score": 3.2,
"vector": "AV:L/AC:L/Au:S/C:P/I:N/A:P"
},
"vhref": "https://vulners.com/osv/OSV:CVE-2022-41742"
},
"highlight": {
"affectedSoftware.version": [
"release-1.11.0",
"1.11.0"
],
"affectedSoftware.name": [
"nginx",
"nginx",
"nginx",
"nginx",
"nginx"
]
},
"sort": [
27.851215,
1666217712000
],
"flatDescription": "NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to cause a worker process crash, or might..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K000133432",
"_score": 26.087091,
"_source": {
"lastseen": "2024-03-19T18:11:22",
"description": "Security Advisory Description\n\nInsufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access. ([CVE-2022-21216]())\n\nImpact\n\nThis vulnerability may allow a privileged user to potentially enable escalation of privilege through adjacent network access.\n\nThe following rSeries platforms are vulnerable:\n\n * r2800 (C130)\n * r4800 (C131)\n * r5600/r5800/r5900 (C129)\n * r10600/r10800/r10900 (C128)\n\n",
"cvss3": {
"cvssV3": {
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"baseScore": 6.8,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"userInteraction": "NONE"
}
},
"published": "2023-04-06T00:00:00",
"type": "f5",
"title": "K000133432 : Intel CPU vulnerability CVE-2022-21216",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 4.1,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"baseScore": 4.7,
"vectorString": "AV:A/AC:L/Au:M/C:P/I:P/A:P",
"version": "2.0",
"accessVector": "ADJACENT_NETWORK",
"authentication": "MULTIPLE"
},
"impactScore": 6.4,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-21216"
],
"modified": "2024-03-12T00:00:00",
"id": "F5:K000133432",
"href": "https://my.f5.com/manage/s/article/K000133432?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 4.7,
"vector": "AV:A/AC:L/Au:M/C:P/I:P/A:P"
},
"vhref": "https://vulners.com/f5/F5:K000133432"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
26.087091,
1680739200000
],
"flatDescription": "Security Advisory Description Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access. (CVE-2022-21216) Impact This..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K12201527",
"_score": 25.268742,
"_source": {
"lastseen": "2024-03-11T20:11:51",
"description": "Security Advisory Description\n\nF5 discloses security vulnerabilities and security exposures for F5 products in Quarterly Security Notifications.\n\nQuarterly Security Notification dates are published in advance so customers can schedule necessary updates in advance of the public disclosure date.\n\nWhen it is necessary to disclose vulnerabilities at any time other than the scheduled Quarterly Security Notification, F5 will notify customers through an F5 Security Announcement, which will include links to Security Advisory articles containing detailed descriptions and steps to address the issue.\n\nTo sign up for F5 Security Announcements, including Quarterly Security Notifications, refer to the [F5 Customer Preference Center]().\n\nFixes for security issues will continue to be included in sustaining releases across F5 products. F5 recommends that customers always run the most current release to optimize the security and performance of their system. For information on the latest available software versions, refer to [K2200: Most recent versions of F5 software]().\n\nScheduled Quarterly Security Notifications\n\nScheduled Quarterly Security Notification| Reference article \n---|--- \nMay 8, 2024| \nFebruary 14, 2024| [K000138353: Quarterly Security Notification (February 2024)]() \nOctober 10, 2023| [K000137053: Overview of F5 vulnerabilities (October 2023)]() \nAugust 2, 2023| [K000135479: Overview of F5 vulnerabilities (August 2023)]() \nMay 3, 2023| [K000133251: Overview of F5 vulnerabilities (May 2023)]() \nFebruary 1, 2023| [K000130496: Overview of F5 vulnerabilities (February 2023)]() \nOctober 19, 2022| [K30425568: Overview of F5 vulnerabilities (October 2022)]() \nAugust 3, 2022| [K14649763: Overview of F5 vulnerabilities (August 2022)]() \nMay 4, 2022| [K55879220: Overview of F5 vulnerabilities (May 2022)]() \nJanuary 19, 2022| [K40084114: Overview of F5 vulnerabilities (January 2022)]()\n\n**Note**: If the most recent scheduled Quarterly Security Notification date has already occurred, then no date has been scheduled for the next notification.\n\n**Note**: If no link is published in the **Reference article** column, the reference article for the next scheduled notification has not been published.\n\n**Note**: F5 Support has no additional information regarding Quarterly Security Notification dates that have not yet been scheduled.\n\nAdditional Security Announcements\n\nSecurity Announcement| Reference article \n---|--- \nOctober 26, 2023| [K000137368: Overview of F5 vulnerabilities (October 26, 2023)]() \nNovember 16, 2022| [K97843387: Overview of F5 vulnerabilities (November 2022)]()\n\nFor more information about this change and the F5 vulnerability management policy, refer to [K4602: Overview of the F5 security vulnerability response policy]().\n",
"cvss3": {},
"published": "2021-11-03T00:00:00",
"type": "f5",
"title": "K12201527 : Overview of Quarterly Security Notifications",
"bulletinFamily": "software",
"cvss2": {},
"cvelist": [],
"modified": "2024-03-11T00:00:00",
"id": "F5:K12201527",
"href": "https://my.f5.com/manage/s/article/K12201527?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 0.0,
"vector": "NONE"
},
"vhref": "https://vulners.com/f5/F5:K12201527"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx agent",
"nginx agent",
"nginx agent",
"nginx agent",
"nginx agent"
]
},
"sort": [
25.268742,
1635897600000
],
"flatDescription": "Security Advisory Description F5 discloses security vulnerabilities and security exposures for F5 products in Quarterly Security Notifications. Quarterly Security Notification dates are published in advance so customers can schedule necessary updates in advance of the public disclosure date. When..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K000132893",
"_score": 18.659794,
"_source": {
"lastseen": "2024-02-28T16:35:17",
"description": "Security Advisory Description\n\nInteger underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer. ([CVE-2022-28733]())\n\nImpact\n\nThis flaw allows an attacker to craft a malicious packet, triggering an integer underflow in grub code. Consequently, the memory allocation for handling the packet data may be smaller than the size needed. This issue causes an out-of-bands write during packet handling, compromising data integrity, confidentiality issues, a denial of service, and remote code execution.\n\n",
"cvss3": {
"exploitabilityScore": 2.2,
"cvssV3": {
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"attackComplexity": "HIGH",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"baseScore": 8.1,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 5.9
},
"published": "2023-03-08T00:00:00",
"type": "f5",
"title": "K000132893 : GRUB2 vulnerability CVE-2022-28733",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 4.9,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "HIGH",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"baseScore": 5.1,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 6.4,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-28733"
],
"modified": "2024-02-21T00:00:00",
"id": "F5:K000132893",
"href": "https://my.f5.com/manage/s/article/K000132893?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 5.1,
"vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
},
"vhref": "https://vulners.com/f5/F5:K000132893"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
18.659794,
1678233600000
],
"flatDescription": "Security Advisory Description Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K000133668",
"_score": 13.22756,
"_source": {
"lastseen": "2024-02-13T16:32:24",
"description": "Security Advisory Description\n\nurllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. ([CVE-2018-20060]())\n\nImpact\n\nFor products with **None** in the **Versions known to be vulnerable** column, there is no impact.\n\nThis vulnerability may allow credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.\n\n",
"cvss3": {
"exploitabilityScore": 3.9,
"cvssV3": {
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"baseScore": 9.8,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0",
"userInteraction": "NONE"
},
"impactScore": 5.9
},
"published": "2023-04-27T00:00:00",
"type": "f5",
"title": "K000133668 : Python urllib3 vulnerability CVE-2018-20060",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 10.0,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"integrityImpact": "NONE",
"baseScore": 5.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2018-20060"
],
"modified": "2024-02-06T00:00:00",
"id": "F5:K000133668",
"href": "https://my.f5.com/manage/s/article/K000133668?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 5.0,
"vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"vhref": "https://vulners.com/f5/F5:K000133668"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx agent",
"nginx agent",
"nginx agent",
"nginx agent",
"nginx agent"
]
},
"sort": [
13.22756,
1682553600000
],
"flatDescription": "Security Advisory Description urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K000134942",
"_score": 13.113279,
"_source": {
"lastseen": "2024-02-13T16:32:23",
"description": "Security Advisory Description\n\nIncorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access. ([CVE-2022-33972]())\n\nImpact\n\nThis vulnerability may allow a privileged user to enable information disclosure through local access.\n\nThe following rSeries platforms are vulnerable if their BIOS version is prior to **2.01.134.1**:\n\n * All variants of r5600/r5800/r5900 (C129)\n * All variants of r10600/r10800/r10900 (C128)\n\nTo determine the BIOS version of your F5 rSeries system, refer to [K000134940: Determine the BIOS version for an F5 rSeries hardware product]().\n\n",
"cvss3": {
"exploitabilityScore": 0.8,
"cvssV3": {
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"baseScore": 4.4,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 3.6
},
"published": "2023-06-22T00:00:00",
"type": "f5",
"title": "K000134942 : Intel CPU vulnerability CVE-2022-33972",
"bulletinFamily": "software",
"cvss2": {
"severity": "LOW",
"exploitabilityScore": 2.5,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"integrityImpact": "NONE",
"baseScore": 1.4,
"vectorString": "AV:L/AC:L/Au:M/C:P/I:N/A:N",
"version": "2.0",
"accessVector": "LOCAL",
"authentication": "MULTIPLE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-33972"
],
"modified": "2024-02-06T00:00:00",
"id": "F5:K000134942",
"href": "https://my.f5.com/manage/s/article/K000134942?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 1.4,
"vector": "AV:L/AC:L/Au:M/C:P/I:N/A:N"
},
"vhref": "https://vulners.com/f5/F5:K000134942"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx agent",
"nginx agent",
"nginx agent",
"nginx agent",
"nginx agent"
]
},
"sort": [
13.113279,
1687392000000
],
"flatDescription": "Security Advisory Description Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access. (CVE-2022-33972) Impact This vulnerability may allow a..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K000132943",
"_score": 11.717604,
"_source": {
"lastseen": "2024-02-09T16:38:38",
"description": "Security Advisory Description\n\nA timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection. ([CVE-2022-4304]() )\n\nImpact\n\nThis vulnerability allows an attacker to recover the pre-master secret used for the original SSL connection, and as a result, the ability to decrypt the application data sent over that SSL connection.\n\n",
"cvss3": {
"exploitabilityScore": 2.2,
"cvssV3": {
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"attackComplexity": "HIGH",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"baseScore": 5.9,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 3.6
},
"published": "2023-03-13T00:00:00",
"type": "f5",
"title": "K000132943 : OpenSSL vulnerability CVE-2022-4304",
"bulletinFamily": "software",
"cvss2": {
"severity": "LOW",
"exploitabilityScore": 4.9,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "HIGH",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"integrityImpact": "NONE",
"baseScore": 2.6,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-4304"
],
"modified": "2024-02-03T00:00:00",
"id": "F5:K000132943",
"href": "https://my.f5.com/manage/s/article/K000132943?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 2.6,
"vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
},
"vhref": "https://vulners.com/f5/F5:K000132943"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
11.717604,
1678665600000
],
"flatDescription": "Security Advisory Description A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K000132946",
"_score": 11.203126,
"_source": {
"lastseen": "2024-02-07T18:06:49",
"description": "Security Advisory Description\n\nThe public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected. ([CVE-2023-0215]())\n\nImpact\n\nThis vulnerability allows an attacker to cause a denial of service to the affected system.\n\n",
"cvss3": {
"cvssV3": {
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"userInteraction": "NONE"
}
},
"published": "2023-03-13T00:00:00",
"type": "f5",
"title": "K000132946 : OpenSSL vulnerability CVE-2023-0215",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 10.0,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"integrityImpact": "NONE",
"baseScore": 5.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2023-0215"
],
"modified": "2024-02-02T00:00:00",
"id": "F5:K000132946",
"href": "https://my.f5.com/manage/s/article/K000132946?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 5.0,
"vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"vhref": "https://vulners.com/f5/F5:K000132946"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
11.203126,
1678665600000
],
"flatDescription": "Security Advisory Description The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K19026212",
"_score": 8.604684,
"_source": {
"lastseen": "2024-01-29T16:10:18",
"description": "Security Advisory Description\n\nApache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. ([CVE-2021-44228]())\n\nImpact\n\nAn attacker can use this vulnerability to construct a specifically crafted packet which can lead to remote code execution.\n\n",
"cvss3": {
"exploitabilityScore": 3.9,
"cvssV3": {
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"attackComplexity": "LOW",
"scope": "CHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"baseScore": 10.0,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 6.0
},
"published": "2021-12-10T00:00:00",
"type": "f5",
"title": "K19026212 : Apache Log4j2 Remote Code Execution vulnerability CVE-2021-44228",
"bulletinFamily": "software",
"cvss2": {
"severity": "HIGH",
"exploitabilityScore": 8.6,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"confidentialityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"baseScore": 9.3,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 10.0,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2021-44228"
],
"modified": "2024-01-22T00:00:00",
"id": "F5:K19026212",
"href": "https://my.f5.com/manage/s/article/K19026212?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 9.3,
"vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
},
"vhref": "https://vulners.com/f5/F5:K19026212"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0",
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
8.604684,
1639094400000
],
"flatDescription": "Security Advisory Description Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K32171392",
"_score": 8.382325,
"_source": {
"lastseen": "2024-01-29T16:10:22",
"description": "Security Advisory Description\n\nIt was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default. ([CVE-2021-45046]())\n\nImpact\n\nThis could allow attackers to craft malicious input data using a JNDI Lookup pattern resulting in a denial of service (DOS) attack.\n\n",
"cvss3": {
"exploitabilityScore": 3.9,
"cvssV3": {
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"attackComplexity": "LOW",
"scope": "CHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"baseScore": 10.0,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 6.0
},
"published": "2021-12-16T00:00:00",
"type": "f5",
"title": "K32171392 : Apache Log4j2 vulnerability CVE-2021-45046",
"bulletinFamily": "software",
"cvss2": {
"severity": "HIGH",
"exploitabilityScore": 8.6,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"confidentialityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"baseScore": 9.3,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 10.0,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2021-44228",
"CVE-2021-45046"
],
"modified": "2024-01-22T00:00:00",
"id": "F5:K32171392",
"href": "https://my.f5.com/manage/s/article/K32171392?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 9.3,
"vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
},
"vhref": "https://vulners.com/f5/F5:K32171392"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0",
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
8.382325,
1639612800000
],
"flatDescription": "Security Advisory Description It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K000132643",
"_score": 7.7513523,
"_source": {
"lastseen": "2024-01-29T16:10:22",
"description": "Security Advisory Description\n\nInconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions. ([CVE-2022-36760]())\n\nImpact\n\nThe connection is not closed when there is an invalid Transfer-Encoding header, allowing an attacker to smuggle requests to the AJP server, where it forwards requests.\n\n",
"cvss3": {
"exploitabilityScore": 2.2,
"cvssV3": {
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"attackComplexity": "HIGH",
"scope": "CHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"baseScore": 9.0,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 6.0
},
"published": "2023-02-22T00:00:00",
"type": "f5",
"title": "K000132643 : Apache HTTP server vulnerability CVE-2022-36760",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 4.9,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "HIGH",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"baseScore": 5.1,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 6.4,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-36760"
],
"modified": "2024-01-22T00:00:00",
"id": "F5:K000132643",
"href": "https://my.f5.com/manage/s/article/K000132643?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 5.1,
"vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
},
"vhref": "https://vulners.com/f5/F5:K000132643"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
7.7513523,
1677024000000
],
"flatDescription": "Security Advisory Description Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K32615023",
"_score": 6.1660852,
"_source": {
"lastseen": "2024-01-24T20:29:01",
"description": "### Security Advisory Description\n\nIt was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0. ([CVE-2022-2588]())\n\nImpact\n\nThis flaw allows a local user to cause a denial-of-service (DoS) on the system and possibly lead to a local privilege escalation problem.\n\n",
"cvss3": {
"exploitabilityScore": 1.8,
"cvssV3": {
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"baseScore": 7.8,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 5.9
},
"published": "2022-10-20T00:00:00",
"type": "f5",
"title": "K32615023 : Linux kernel vulnerability CVE-2022-2588",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 3.1,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"baseScore": 4.3,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0",
"accessVector": "LOCAL",
"authentication": "SINGLE"
},
"impactScore": 6.4,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-2588"
],
"modified": "2024-01-16T00:00:00",
"id": "F5:K32615023",
"href": "https://my.f5.com/manage/s/article/K32615023?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 4.3,
"vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"
},
"vhref": "https://vulners.com/f5/F5:K32615023"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
6.1660852,
1666224000000
],
"flatDescription": "Security Advisory Description It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0. (CVE-2022-2588) Impact This flaw allows a local user to cause a denial-of-service (DoS) on..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K27155546",
"_score": 4.543277,
"_source": {
"lastseen": "2024-01-24T20:29:26",
"description": "### Security Advisory Description\n\nBy spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. ([CVE-2022-38177]())\n\nImpact\n\nThere is no impact; F5 products are not affected by this vulnerability in default, standard, or recommended configurations. However, if the BIND configuration (**named.conf**) has been modified to enable DNS recursion with the **recursion yes;** line added to the **options** section of your BIND configuration file, an attacker can trigger a small memory leak and erode available memory over time, causing **named** to terminate.\n\n",
"cvss3": {
"exploitabilityScore": 3.9,
"cvssV3": {
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 3.6
},
"published": "2022-10-19T00:00:00",
"type": "f5",
"title": "K27155546 : BIND vulnerability CVE-2022-38177",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 10.0,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"integrityImpact": "NONE",
"baseScore": 5.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-38177"
],
"modified": "2024-01-08T00:00:00",
"id": "F5:K27155546",
"href": "https://my.f5.com/manage/s/article/K27155546?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 5.0,
"vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"vhref": "https://vulners.com/f5/F5:K27155546"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
4.543277,
1666137600000
],
"flatDescription": "Security Advisory Description By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. (CVE-2022-38177) Impact There..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K34525368",
"_score": 4.4400206,
"_source": {
"lastseen": "2024-01-24T20:29:13",
"description": "Security Advisory Description\n\nWhen a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate. ([CVE-2023-22340]())\n\nImpact\n\nTraffic is disrupted while the TMM process restarts. This vulnerability allows a remote unauthenticated attacker to cause a denial-of-service (DoS) on the BIG-IP system. There is no control plane exposure; this is a data plane issue only.\n\n",
"cvss3": {
"cvssV3": {
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"userInteraction": "NONE"
}
},
"published": "2023-02-01T00:00:00",
"type": "f5",
"title": "K34525368 : BIG-IP SIP profile vulnerability CVE-2023-22340",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 10.0,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"integrityImpact": "NONE",
"baseScore": 5.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2023-22340"
],
"modified": "2024-01-08T00:00:00",
"id": "F5:K34525368",
"href": "https://my.f5.com/manage/s/article/K34525368?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 5.0,
"vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"vhref": "https://vulners.com/f5/F5:K34525368"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
4.4400206,
1675209600000
],
"flatDescription": "Security Advisory Description When a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate. (CVE-2023-22340) Impact Traffic is disrupted while the TMM process restarts. This vulnerability allows a remote unauthenticated attacker to cause..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K31523465",
"_score": 4.41371,
"_source": {
"lastseen": "2024-01-24T20:29:19",
"description": "### Security Advisory Description\nWhile Intel QAT (QuickAssist Technology) and the AES-GCM/CCM cipher is in use, undisclosed conditions cause the BIG-IP system to send data unencrypted, even with an SSL profile applied. ([CVE-2022-41983]())\n\nImpact\n\nThis vulnerability may expose confidential information to a man-in-the-middle attacker, as data is sent without required encryption. Since this vulnerability results in a TLS record with a bad MAC, the connection will typically be aborted due to failed MAC verification after decrypt.\n\nThis vulnerability applies to the following platforms:\n\n * B4450N (A114)\n * i4000 (C115)\n * i10000 (C116/C127)\n * i7000 (C118)\n * i5000 (C119)\n * i11000 (C123)\n * i11000-DS (C124)\n * i15000 (D116)\n * 2000 (C112)\n * 4000 (C113)\n * F5 rSeries\n * F5 VELOS\n * BIG-IP Virtual Edition on Hypervisors with Intel Processors, when configured to use Intel QAT.\n\n",
"cvss3": {
"exploitabilityScore": 2.2,
"cvssV3": {
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"attackComplexity": "HIGH",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"baseScore": 3.7,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 1.4
},
"published": "2022-10-19T00:00:00",
"type": "f5",
"title": "K31523465 : BIG-IP TMM vulnerability CVE-2022-41983",
"bulletinFamily": "software",
"cvss2": {
"severity": "LOW",
"exploitabilityScore": 4.9,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "HIGH",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"integrityImpact": "NONE",
"baseScore": 2.6,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-41983"
],
"modified": "2024-01-08T00:00:00",
"id": "F5:K31523465",
"href": "https://my.f5.com/manage/s/article/K31523465?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 2.6,
"vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
},
"vhref": "https://vulners.com/f5/F5:K31523465"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
4.41371,
1666137600000
],
"flatDescription": "Security Advisory Description While Intel QAT (QuickAssist Technology) and the AES-GCM/CCM cipher is in use, undisclosed conditions cause the BIG-IP system to send data unencrypted, even with an SSL profile applied. (CVE-2022-41983) Impact This vulnerability may expose confidential information to..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K22505850",
"_score": 4.41063,
"_source": {
"lastseen": "2024-01-24T20:29:41",
"description": "### Security Advisory Description\n\nAn authenticated iControl REST user can cause an increase in memory resource utilization, through undisclosed requests. ([CVE-2022-41770]())\n\nImpact\n\nBIG-IP and BIG-IQ\n\nSystem performance degradation can occur until the process is either forced to restart or manually restarted. This vulnerability allows a remote, authenticated attacker to cause a degradation of service that can lead to a denial-of-service (DoS) on the BIG-IP system.\n\n",
"cvss3": {
"exploitabilityScore": 2.8,
"cvssV3": {
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"baseScore": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 3.6
},
"published": "2022-10-19T00:00:00",
"type": "f5",
"title": "K22505850 : BIG-IP and BIG-IQ iControl REST vulnerability CVE-2022-41770",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 8.0,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"integrityImpact": "NONE",
"baseScore": 4.0,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "SINGLE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-41770"
],
"modified": "2024-01-08T00:00:00",
"id": "F5:K22505850",
"href": "https://my.f5.com/manage/s/article/K22505850?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 4.0,
"vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
},
"vhref": "https://vulners.com/f5/F5:K22505850"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
4.41063,
1666137600000
],
"flatDescription": "Security Advisory Description An authenticated iControl REST user can cause an increase in memory resource utilization, through undisclosed requests. (CVE-2022-41770) Impact BIG-IP and BIG-IQ System performance degradation can occur until the process is either forced to restart or manually..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K44454157",
"_score": 4.257943,
"_source": {
"lastseen": "2024-01-24T20:29:37",
"description": "### Security Advisory Description\n\nlibexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c. ([CVE-2022-40674]())\n\nImpact\n\nAn attacker may be able to use crafted XML to reference previously freed memory, leading to data corruption or the execution of arbitrary code.\n\n",
"cvss3": {
"exploitabilityScore": 2.2,
"cvssV3": {
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"attackComplexity": "HIGH",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"baseScore": 8.1,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 5.9
},
"published": "2022-10-31T00:00:00",
"type": "f5",
"title": "K44454157 : Expat vulnerability CVE-2022-40674",
"bulletinFamily": "software",
"cvss2": {
"severity": "MEDIUM",
"exploitabilityScore": 4.9,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "HIGH",
"confidentialityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"baseScore": 5.1,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "NONE"
},
"impactScore": 6.4,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-40674"
],
"modified": "2024-01-08T00:00:00",
"id": "F5:K44454157",
"href": "https://my.f5.com/manage/s/article/K44454157?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 5.1,
"vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
},
"vhref": "https://vulners.com/f5/F5:K44454157"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
4.257943,
1667174400000
],
"flatDescription": "Security Advisory Description libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c. (CVE-2022-40674) Impact An attacker may be able to use crafted XML to reference previously freed memory, leading to data corruption or the execution of arbitrary..."
},
{
"_index": "es6_bulletins_bulletin_v5",
"_type": "_doc",
"_id": "F5:K64829234",
"_score": 3.7184553,
"_source": {
"lastseen": "2024-01-24T20:30:04",
"description": "### Security Advisory Description\n\nWhen an SSL key is imported on a BIG-IP or BIG-IQ system, undisclosed input can cause the mcpd process to terminate. ([CVE-2022-41694]())\n\nImpact\n\nTraffic is disrupted while the **mcpd** process restarts. This vulnerability allows a remote, authenticated attacker to cause a denial-of-service (DoS) on the BIG-IP system. There is no data plane exposure; this is a control plane issue only.\n\n",
"cvss3": {
"exploitabilityScore": 1.2,
"cvssV3": {
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"attackComplexity": "LOW",
"scope": "UNCHANGED",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"baseScore": 4.9,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"userInteraction": "NONE"
},
"impactScore": 3.6
},
"published": "2022-10-19T00:00:00",
"type": "f5",
"title": "K64829234 : BIG-IP and BIG-IQ mcpd vulnerability CVE-2022-41694",
"bulletinFamily": "software",
"cvss2": {
"severity": "LOW",
"exploitabilityScore": 6.4,
"obtainAllPrivilege": false,
"userInteractionRequired": false,
"obtainOtherPrivilege": false,
"cvssV2": {
"accessComplexity": "LOW",
"confidentialityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"integrityImpact": "NONE",
"baseScore": 3.3,
"vectorString": "AV:N/AC:L/Au:M/C:N/I:N/A:P",
"version": "2.0",
"accessVector": "NETWORK",
"authentication": "MULTIPLE"
},
"impactScore": 2.9,
"acInsufInfo": false,
"obtainUserPrivilege": false
},
"cvelist": [
"CVE-2022-41694"
],
"modified": "2024-01-04T00:00:00",
"id": "F5:K64829234",
"href": "https://my.f5.com/manage/s/article/K64829234?utm_source=f5support&utm_medium=RSS",
"cvss": {
"score": 3.3,
"vector": "AV:N/AC:L/Au:M/C:N/I:N/A:P"
},
"vhref": "https://vulners.com/f5/F5:K64829234"
},
"highlight": {
"affectedSoftware.version": [
"1.11.0"
],
"affectedSoftware.name": [
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus",
"nginx plus"
]
},
"sort": [
3.7184553,
1666137600000
],
"flatDescription": "Security Advisory Description When an SSL key is imported on a BIG-IP or BIG-IQ system, undisclosed input can cause the mcpd process to terminate. (CVE-2022-41694) Impact Traffic is disrupted while the mcpd process restarts. This vulnerability allows a remote, authenticated attacker to cause a..."
}
],
"occurrences": {},
"exactMatch": null,
"references": null,
"total": 253,
"maxSearchSize": 100
}
}