Lucene search

K

CVE-2021-22974

🗓️ 12 Feb 2021 17:14:15Reported by f5Type 
cve
 cve
🔗 web.nvd.nist.gov📰️ 2 Media mentions👁 73 Views

CVE-2021-22974 On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.6 and all versions of BIG-IQ 7.x and 6.x, an authenticated attacker with access to iControl REST over the control plane may be able to take advantage of a race condition to execute commands with an elevated privilege level. This vulnerability is due to an incomplete fix for CVE-2017-6167. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Detection
Affected
Refs
Social
ReporterTitlePublishedViews
Family
NVD
CVE-2021-22974
12 Feb 202117:15
nvd
NVD
CVE-2017-6167
21 Dec 201717:29
nvd
Cvelist
CVE-2021-22974
12 Feb 202116:23
cvelist
Cvelist
CVE-2017-6167
21 Dec 201717:00
cvelist
Prion
Race condition
12 Feb 202117:15
prion
Prion
Race condition
21 Dec 201717:29
prion
Tenable Nessus
F5 Networks BIG-IP : iControl REST vulnerability (K68652018)
11 Feb 202100:00
nessus
Tenable Nessus
F5 Networks BIG-IP : iControl REST vulnerability (K24465120)
2 Nov 201800:00
nessus
CNVD
BIG-IP Competitive Conditions Issue Vulnerability (CNVD-2021-13215)
25 Feb 202100:00
cnvd
F5 Networks
K68652018 : iControl REST vulnerability CVE-2021-22974
10 Feb 202100:00
f5
Rows per page
Nvd
Node
f5big-ip_access_policy_managerRange13.1.013.1.3.6
OR
f5big-ip_access_policy_managerRange14.1.014.1.3.1
OR
f5big-ip_access_policy_managerRange15.1.015.1.2
OR
f5big-ip_access_policy_managerRange16.0.016.0.1.1
OROROROROROROROROR
f5big-ip_analyticsRange13.1.013.1.3.6
OR
f5big-ip_analyticsRange14.1.014.1.3.1
OR
f5big-ip_analyticsRange15.1.015.1.2
OR
f5big-ip_analyticsRange16.0.016.0.1.1
OROROROROROROROROR
f5big-ip_ddos_hybrid_defenderRange13.1.013.1.3.6
OR
f5big-ip_ddos_hybrid_defenderRange14.1.014.1.3.1
OR
f5big-ip_ddos_hybrid_defenderRange15.1.015.1.2
OR
f5big-ip_ddos_hybrid_defenderRange16.0.016.0.1.1
OR
f5big-ip_domain_name_systemRange13.1.013.1.3.6
OR
f5big-ip_domain_name_systemRange14.1.014.1.3.1
OR
f5big-ip_domain_name_systemRange15.1.015.1.2
OR
f5big-ip_domain_name_systemRange16.0.016.0.1.1
OR
f5big-ip_fraud_protection_serviceRange13.1.013.1.3.5
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.3.1
OROR
f5big-ip_fraud_protection_serviceRange16.0.016.0.1.1
OR
f5big-ip_global_traffic_managerRange13.1.013.1.3.6
OR
f5big-ip_global_traffic_managerRange14.1.014.1.3.1
OROR
f5big-ip_global_traffic_managerRange16.0.016.0.1.1
OR
f5big-ip_link_controllerRange13.1.013.1.3.6
OR
f5big-ip_link_controllerRange14.1.014.1.3.1
OR
f5big-ip_link_controllerRange15.1.015.1.2
OR
f5big-ip_link_controllerRange16.0.016.0.1.1
OR
f5big-ip_local_traffic_managerRange13.1.013.1.3.6
OR
f5big-ip_local_traffic_managerRange14.1.014.1.3.1
OR
f5big-ip_local_traffic_managerRange15.1.015.1.2
OR
f5big-ip_local_traffic_managerRange16.0.016.0.1.1
OROROROROR
f5big-ip_ssl_orchestratorRange13.1.013.1.3.6
OR
f5big-ip_ssl_orchestratorRange14.1.014.1.3.1
OR
f5big-ip_ssl_orchestratorRange15.1.015.1.2
OR
f5big-ip_ssl_orchestratorRange16.0.016.0.1.1
OROR
[
  {
    "product": "BIG-IP, BIG-IQ",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.6 and all versions of BIG-IQ 7.x and 6.x"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
12 Feb 2021 17:15Current
7.6High risk
Vulners AI Score7.6
CVSS26
CVSS37.5
EPSS0.00329
73
.json
Report