Lucene search

K
cve[email protected]CVE-2022-36795
HistoryOct 19, 2022 - 10:15 p.m.

CVE-2022-36795

2022-10-1922:15:11
CWE-682
web.nvd.nist.gov
34
4
big-ip
vulnerability
ltm
tcp
profile
cve-2022-36795
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%

In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.7, and 14.1.x before 14.1.5.1, when an LTM TCP profile with Auto Receive Window Enabled is configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing new client connections.

Affected configurations

NVD
Node
f5big-ip_access_policy_managerRange14.1.014.1.5.1
OR
f5big-ip_access_policy_managerRange15.1.015.1.7
OR
f5big-ip_access_policy_managerRange16.1.016.1.3.1
OR
f5big-ip_access_policy_managerRange17.0.017.0.0.1
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.5.1
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.7
OR
f5big-ip_advanced_firewall_managerRange16.1.016.1.3.1
OR
f5big-ip_advanced_firewall_managerRange17.0.017.0.0.1
OR
f5big-ip_analyticsRange14.1.014.1.5.1
OR
f5big-ip_analyticsRange15.1.015.1.7
OR
f5big-ip_analyticsRange16.1.016.1.3.1
OR
f5big-ip_analyticsRange17.0.017.0.0.1
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.5.1
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.7
OR
f5big-ip_application_acceleration_managerRange16.1.016.1.3.1
OR
f5big-ip_application_acceleration_managerRange17.0.017.0.0.1
OR
f5big-ip_application_security_managerRange14.1.014.1.5.1
OR
f5big-ip_application_security_managerRange15.1.015.1.7
OR
f5big-ip_application_security_managerRange16.1.016.1.3.1
OR
f5big-ip_application_security_managerRange17.0.017.0.0.1
OR
f5big-ip_domain_name_systemRange14.1.014.1.5.1
OR
f5big-ip_domain_name_systemRange15.1.015.1.7
OR
f5big-ip_domain_name_systemRange16.1.016.1.3.1
OR
f5big-ip_domain_name_systemRange17.0.017.0.0.1
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.5.1
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.7
OR
f5big-ip_fraud_protection_serviceRange16.1.016.1.3.1
OR
f5big-ip_fraud_protection_serviceRange17.0.017.0.0.1
OR
f5big-ip_global_traffic_managerRange14.1.014.1.5.1
OR
f5big-ip_global_traffic_managerRange15.1.015.1.7
OR
f5big-ip_global_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_global_traffic_managerRange17.0.017.0.0.1
OR
f5big-ip_link_controllerRange14.1.014.1.5.1
OR
f5big-ip_link_controllerRange15.1.015.1.7
OR
f5big-ip_link_controllerRange16.1.016.1.3.1
OR
f5big-ip_link_controllerRange17.0.017.0.0.1
OR
f5big-ip_local_traffic_managerRange14.1.014.1.5.1
OR
f5big-ip_local_traffic_managerRange15.1.015.1.7
OR
f5big-ip_local_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_local_traffic_managerRange17.0.017.0.0.1
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.5.1
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.7
OR
f5big-ip_policy_enforcement_managerRange16.1.016.1.3.1
OR
f5big-ip_policy_enforcement_managerRange17.0.017.0.0.1

CNA Affected

[
  {
    "vendor": "F5",
    "product": "BIG-IP",
    "versions": [
      {
        "version": "17.0.x",
        "status": "affected",
        "lessThan": "17.0.0.1",
        "versionType": "custom"
      },
      {
        "version": "16.1.x",
        "status": "affected",
        "lessThan": "16.1.3.1",
        "versionType": "custom"
      },
      {
        "version": "15.1.x",
        "status": "affected",
        "lessThan": "15.1.7",
        "versionType": "custom"
      },
      {
        "version": "14.1.x",
        "status": "affected",
        "lessThan": "14.1.5.1",
        "versionType": "custom"
      },
      {
        "version": "13.1.0",
        "status": "unaffected",
        "lessThan": "13.1.x*",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%

Related for CVE-2022-36795