Lucene search

K
cve[email protected]CVE-2023-22302
HistoryFeb 01, 2023 - 6:15 p.m.

CVE-2023-22302

2023-02-0118:15:10
CWE-772
web.nvd.nist.gov
26
cve-2023-22302
big-ip
security
vulnerability
http
tmm
nvd

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.7%

In BIG-IP versions 17.0.x before 17.0.0.2, and 16.1.x beginning in 16.1.2.2 to before 16.1.3.3, when an HTTP profile is configured on a virtual server and conditions beyond the attacker’s control exist on the target pool member, undisclosed requests sent to the BIG-IP system can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

NVD
Node
f5big-ip_access_policy_managerRange16.1.2.216.1.3.3
OR
f5big-ip_access_policy_managerRange17.0.017.0.0.2
OR
f5big-ip_advanced_firewall_managerRange16.1.2.216.1.3.3
OR
f5big-ip_advanced_firewall_managerRange17.0.017.0.0.2
OR
f5big-ip_analyticsRange16.1.2.216.1.3.3
OR
f5big-ip_analyticsRange17.0.017.0.0.2
OR
f5big-ip_application_acceleration_managerRange16.1.2.216.1.3.3
OR
f5big-ip_application_acceleration_managerRange17.0.017.0.0.2
OR
f5big-ip_application_security_managerRange16.1.2.216.1.3.3
OR
f5big-ip_application_security_managerRange17.0.017.0.0.2
OR
f5big-ip_ddos_hybrid_defenderRange16.1.2.216.1.3.3
OR
f5big-ip_ddos_hybrid_defenderRange17.0.017.0.0.2
OR
f5big-ip_domain_name_systemRange16.1.2.216.1.3.3
OR
f5big-ip_domain_name_systemRange17.0.017.0.0.2
OR
f5big-ip_fraud_protection_serviceRange16.1.2.216.1.3.3
OR
f5big-ip_fraud_protection_serviceRange17.0.017.0.0.2
OR
f5big-ip_link_controllerRange16.1.2.216.1.3.3
OR
f5big-ip_link_controllerRange17.0.017.0.0.2
OR
f5big-ip_local_traffic_managerRange16.1.2.216.1.3.3
OR
f5big-ip_local_traffic_managerRange17.0.017.0.0.2
OR
f5big-ip_policy_enforcement_managerRange16.1.2.216.1.3.3
OR
f5big-ip_policy_enforcement_managerRange17.0.017.0.0.2
OR
f5big-ip_ssl_orchestratorRange16.1.2.216.1.3.3
OR
f5big-ip_ssl_orchestratorRange17.0.017.0.0.2

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "modules": [
      "All modules"
    ],
    "product": "BIG-IP",
    "vendor": "F5",
    "versions": [
      {
        "lessThan": "17.0.0.2",
        "status": "affected",
        "version": "17.0.0",
        "versionType": "semver"
      },
      {
        "lessThan": "16.1.3.3",
        "status": "affected",
        "version": "16.1.2.2",
        "versionType": "semver"
      }
    ]
  }
]

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.7%

Related for CVE-2023-22302