CVE-2021-22992

Severity
9.8CRITICAL
EPSS
7.8%
top 8.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 31
Latest updateMay 24

Description

On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, a malicious HTTP response to an Advanced WAF/BIG-IP ASM virtual server with Login Page configured in its policy may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may allow remote code execution (RCE), leading to complete system compromise. Note: Software versions which have reached End of Software De

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages15 packages

NVDf5/big-ip_domain_name_system11.6.111.6.5.3+5
NVDf5/big-ip_access_policy_manager11.6.111.6.5.3+5
NVDf5/big-ip_advanced_firewall_manager11.6.111.6.5.3+5
NVDf5/big-ip_policy_enforcement_manager11.6.111.6.5.3+5

🔴Vulnerability Details

2
GHSA
GHSA-4f8p-5r29-jr72: On BIG-IP versions 162022-05-24
CVEList
CVE-2021-22992: On BIG-IP versions 162021-03-31

📋Vendor Advisories

1
F5
CVE-2021-22992: On BIG-IP versions 162021-03-31
CVE-2021-22992 (CRITICAL CVSS 9.8) | On BIG-IP versions 16.0.x before 16 | cvebase.io