CVE-2021-22987

4 documents4 sources
Severity
9.9CRITICAL
EPSS
1.5%
top 18.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 31
Latest updateMay 24

Description

On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3 when running in Appliance mode, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 3.1 | Impact: 6.0

Affected Packages15 packages

CVEListV5big-ip_appliance_mode16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3
NVDf5/big-ip_local_traffic_manager11.6.111.6.5.3+5
NVDf5/big-ip_global_traffic_manager11.6.111.6.5.3+5
NVDf5/big-ip_analytics11.6.111.6.5.3+5
NVDf5/ssl_orchestrator11.6.111.6.5.3+5

🔴Vulnerability Details

2
GHSA
GHSA-h6q8-h24w-7xp3: On BIG-IP versions 162022-05-24
CVEList
CVE-2021-22987: On BIG-IP versions 162021-03-31

📋Vendor Advisories

1
F5
CVE-2021-22987: On BIG-IP versions 162021-03-31
CVE-2021-22987 (CRITICAL CVSS 9.9) | On BIG-IP versions 16.0.x before 16 | cvebase.io