CVE-2021-23026Cross-Site Request Forgery in F5 Big-ip Access Policy Manager

Severity
8.8HIGHNVD
EPSS
0.3%
top 46.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 14
Latest updateMay 24

Description

BIG-IP version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.4.2, 13.1.x before 13.1.4.1, and all versions of 12.1.x and 11.6.x and all versions of BIG-IQ 8.x, 7.x, and 6.x are vulnerable to cross-site request forgery (CSRF) attacks through iControl SOAP. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages15 packages

NVDf5/big-ip_analytics13.1.013.1.4+3
NVDf5/big-ip_link_controller13.1.013.1.4+3
NVDf5/big-ip_ssl_orchestrator13.1.013.1.4+3
NVDf5/big-ip_domain_name_system13.1.013.1.4+3
NVDf5/big-ip_ddos_hybrid_defender13.1.013.1.4+3

🔴Vulnerability Details

2
GHSA
GHSA-xxmf-w3h3-38rf: BIG-IP version 162022-05-24
CVEList
CVE-2021-23026: BIG-IP version 162021-09-14

📋Vendor Advisories

1
F5
CVE-2021-23026: BIG-IP version 162021-09-14
CVE-2021-23026 — Cross-Site Request Forgery in F5 | cvebase