Lucene search

K
cve[email protected]CVE-2022-23011
HistoryJan 25, 2022 - 8:15 p.m.

CVE-2022-23011

2022-01-2520:15:09
CWE-682
web.nvd.nist.gov
60
cve-2022-23011
big-ip
virtual servers
syn cookie protection
tcp traffic
nvd
security vulnerability

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

38.3%

On certain hardware BIG-IP platforms, in version 15.1.x before 15.1.4 and 14.1.x before 14.1.3, virtual servers may stop responding while processing TCP traffic due to an issue in the SYN Cookie Protection feature. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

NVD
Node
f5big-ip_access_policy_managerRange14.1.014.1.3
OR
f5big-ip_access_policy_managerRange15.1.015.1.4
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.3
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.4
OR
f5big-ip_analyticsRange14.1.014.1.3
OR
f5big-ip_analyticsRange15.1.015.1.4
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.3
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.4
OR
f5big-ip_application_security_managerRange14.1.014.1.3
OR
f5big-ip_application_security_managerRange15.1.015.1.4
OR
f5big-ip_domain_name_systemRange14.1.014.1.3
OR
f5big-ip_domain_name_systemRange15.1.015.1.4
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.3
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.4
OR
f5big-ip_global_traffic_managerRange14.1.014.1.3
OR
f5big-ip_global_traffic_managerRange15.1.015.1.4
OR
f5big-ip_link_controllerRange14.1.014.1.3
OR
f5big-ip_link_controllerRange15.1.015.1.4
OR
f5big-ip_local_traffic_managerRange14.1.014.1.3
OR
f5big-ip_local_traffic_managerRange15.1.015.1.4
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.3
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.4
AND
f5big-ip_i850Match-
Node
f5big-ip_access_policy_managerRange14.1.014.1.3
OR
f5big-ip_access_policy_managerRange15.1.015.1.4
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.3
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.4
OR
f5big-ip_analyticsRange14.1.014.1.3
OR
f5big-ip_analyticsRange15.1.015.1.4
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.3
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.4
OR
f5big-ip_application_security_managerRange14.1.014.1.3
OR
f5big-ip_application_security_managerRange15.1.015.1.4
OR
f5big-ip_domain_name_systemRange14.1.014.1.3
OR
f5big-ip_domain_name_systemRange15.1.015.1.4
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.3
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.4
OR
f5big-ip_global_traffic_managerRange14.1.014.1.3
OR
f5big-ip_global_traffic_managerRange15.1.015.1.4
OR
f5big-ip_link_controllerRange14.1.014.1.3
OR
f5big-ip_link_controllerRange15.1.015.1.4
OR
f5big-ip_local_traffic_managerRange14.1.014.1.3
OR
f5big-ip_local_traffic_managerRange15.1.015.1.4
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.3
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.4
AND
f5big-ip_i2600Match-
Node
f5big-ip_access_policy_managerRange14.1.014.1.3
OR
f5big-ip_access_policy_managerRange15.1.015.1.4
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.3
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.4
OR
f5big-ip_analyticsRange14.1.014.1.3
OR
f5big-ip_analyticsRange15.1.015.1.4
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.3
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.4
OR
f5big-ip_application_security_managerRange14.1.014.1.3
OR
f5big-ip_application_security_managerRange15.1.015.1.4
OR
f5big-ip_domain_name_systemRange14.1.014.1.3
OR
f5big-ip_domain_name_systemRange15.1.015.1.4
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.3
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.4
OR
f5big-ip_global_traffic_managerRange14.1.014.1.3
OR
f5big-ip_global_traffic_managerRange15.1.015.1.4
OR
f5big-ip_link_controllerRange14.1.014.1.3
OR
f5big-ip_link_controllerRange15.1.015.1.4
OR
f5big-ip_local_traffic_managerRange14.1.014.1.3
OR
f5big-ip_local_traffic_managerRange15.1.015.1.4
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.3
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.4
AND
f5big-ip_i2800Match-

CNA Affected

[
  {
    "product": "BIG-IP",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "15.1.x before 15.1.4 and 14.1.x before 14.1.3"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

38.3%

Related for CVE-2022-23011