Lucene search

K
cve[email protected]CVE-2022-41983
HistoryOct 19, 2022 - 10:15 p.m.

CVE-2022-41983

2022-10-1922:15:13
CWE-319
web.nvd.nist.gov
39
3
cve-2022-41983
big-ip
vulnerability
nvd
security
ssl
encryption
intel qat
aes-gcm
aes-ccm
cipher
hardware
platform
data
unencrypted

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.3%

On specific hardware platforms, on BIG-IP versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.7, 14.1.x before 14.1.5.1, and all versions of 13.1.x, while Intel QAT (QuickAssist Technology) and the AES-GCM/CCM cipher is in use, undisclosed conditions can cause BIG-IP to send data unencrypted even with an SSL Profile applied.

Affected configurations

NVD
Node
f5big-ip_access_policy_managerRange13.1.013.1.5
OR
f5big-ip_access_policy_managerRange14.1.014.1.5.1
OR
f5big-ip_access_policy_managerRange15.1.015.1.7
OR
f5big-ip_access_policy_managerRange16.1.016.1.3.1
OR
f5big-ip_advanced_firewall_managerRange13.1.013.1.5
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.5.1
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.7
OR
f5big-ip_advanced_firewall_managerRange16.1.016.1.3.1
OR
f5big-ip_advanced_web_application_firewallRange13.1.013.1.5
OR
f5big-ip_advanced_web_application_firewallRange14.1.014.1.5.1
OR
f5big-ip_advanced_web_application_firewallRange15.1.015.1.7
OR
f5big-ip_advanced_web_application_firewallRange16.1.016.1.3.1
OR
f5big-ip_analyticsRange13.1.013.1.5
OR
f5big-ip_analyticsRange14.1.014.1.5.1
OR
f5big-ip_analyticsRange15.1.015.1.7
OR
f5big-ip_analyticsRange16.1.016.1.3.1
OR
f5big-ip_application_acceleration_managerRange13.1.013.1.5
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.5.1
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.7
OR
f5big-ip_application_acceleration_managerRange16.1.016.1.3.1
OR
f5big-ip_application_security_managerRange13.1.013.1.5
OR
f5big-ip_application_security_managerRange14.1.014.1.5.1
OR
f5big-ip_application_security_managerRange15.1.015.1.7
OR
f5big-ip_application_security_managerRange16.1.016.1.3.1
OR
f5big-ip_application_visibility_and_reportingRange13.1.013.1.5
OR
f5big-ip_application_visibility_and_reportingRange14.1.014.1.5.1
OR
f5big-ip_application_visibility_and_reportingRange15.1.015.1.7
OR
f5big-ip_application_visibility_and_reportingRange16.1.016.1.3.1
OR
f5big-ip_carrier-grade_natRange13.1.013.1.5
OR
f5big-ip_carrier-grade_natRange14.1.014.1.5.1
OR
f5big-ip_carrier-grade_natRange15.1.015.1.7
OR
f5big-ip_carrier-grade_natRange16.1.016.1.3.1
OR
f5big-ip_ddos_hybrid_defenderRange13.1.013.1.5
OR
f5big-ip_ddos_hybrid_defenderRange14.1.014.1.5.1
OR
f5big-ip_ddos_hybrid_defenderRange15.1.015.1.7
OR
f5big-ip_ddos_hybrid_defenderRange16.1.016.1.3.1
OR
f5big-ip_domain_name_systemRange13.1.013.1.5
OR
f5big-ip_domain_name_systemRange14.1.014.1.5.1
OR
f5big-ip_domain_name_systemRange15.1.015.1.7
OR
f5big-ip_domain_name_systemRange16.1.016.1.3.1
OR
f5big-ip_edge_gatewayRange13.1.013.1.5
OR
f5big-ip_edge_gatewayRange14.1.014.1.5.1
OR
f5big-ip_edge_gatewayRange15.1.015.1.7
OR
f5big-ip_edge_gatewayRange16.1.016.1.3.1
OR
f5big-ip_fraud_protection_serviceRange13.1.013.1.5
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.5.1
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.6
OR
f5big-ip_fraud_protection_serviceRange16.1.016.1.3.1
OR
f5big-ip_global_traffic_managerRange13.1.013.1.5
OR
f5big-ip_global_traffic_managerRange14.1.014.1.5.1
OR
f5big-ip_global_traffic_managerRange15.1.015.1.7
OR
f5big-ip_global_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_link_controllerRange13.1.013.1.5
OR
f5big-ip_link_controllerRange14.1.014.1.5.1
OR
f5big-ip_link_controllerRange15.1.015.1.7
OR
f5big-ip_link_controllerRange16.1.016.1.3.1
OR
f5big-ip_local_traffic_managerRange13.1.013.1.5
OR
f5big-ip_local_traffic_managerRange14.1.014.1.5.1
OR
f5big-ip_local_traffic_managerRange15.1.015.1.7
OR
f5big-ip_local_traffic_managerRange16.1.016.1.3.1
OR
f5big-ip_policy_enforcement_managerRange13.1.013.1.5
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.5.1
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.7
OR
f5big-ip_policy_enforcement_managerRange16.1.016.1.3.1
OR
f5big-ip_ssl_orchestratorRange13.1.013.1.5
OR
f5big-ip_ssl_orchestratorRange14.1.014.1.5.1
OR
f5big-ip_ssl_orchestratorRange15.1.015.1.7
OR
f5big-ip_ssl_orchestratorRange16.1.016.1.3.1
OR
f5big-ip_webacceleratorRange13.1.013.1.5
OR
f5big-ip_webacceleratorRange14.1.014.1.5.1
OR
f5big-ip_webacceleratorRange15.1.015.1.7
OR
f5big-ip_webacceleratorRange16.1.016.1.3.1
OR
f5big-ip_websafeRange13.1.013.1.5
OR
f5big-ip_websafeRange14.1.014.1.5.1
OR
f5big-ip_websafeRange15.1.015.1.7
OR
f5big-ip_websafeRange16.1.016.1.3.1

CNA Affected

[
  {
    "vendor": "F5",
    "product": "BIG-IP",
    "versions": [
      {
        "version": "17.0.0",
        "status": "unaffected",
        "lessThan": "17.0.x*",
        "versionType": "custom"
      },
      {
        "version": "16.1.x",
        "status": "affected",
        "lessThan": "16.1.3.1",
        "versionType": "custom"
      },
      {
        "version": "15.1.x",
        "status": "affected",
        "lessThan": "15.1.7",
        "versionType": "custom"
      },
      {
        "version": "14.1.x",
        "status": "affected",
        "lessThan": "14.1.5.1",
        "versionType": "custom"
      },
      {
        "version": "13.1.0",
        "status": "affected",
        "lessThan": "13.1.x*",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.3%

Related for CVE-2022-41983