CVE-2022-1389Cross-Site Request Forgery in F5 Big-ip

Severity
4.3MEDIUMNVD
CNA3.1
EPSS
0.1%
top 75.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 5
Latest updateJan 20

Description

On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP (fixed in 17.0.0), a cross-site request forgery (CSRF) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. This vulnerability allows an attacker to run a limited set of commands: ping, traceroute, and WOM diagnostics. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages12 packages

CVEListV5f5/big-ip6 versions+5
NVDf5/big-ip_analytics31 versions+30
NVDf5/big-ip_link_controller31 versions+30
NVDf5/big-ip_domain_name_system31 versions+30

🔴Vulnerability Details

2
GHSA
GHSA-qjgv-xj3p-jhxq: On all versions of 162022-05-06
CVEList
CVE-2022-1389: On all versions of 162022-05-05

📋Vendor Advisories

2
Red Hat
mod_security: incorrect parsing of HTTP multipart requests leads to web application firewall bypass2023-01-20
F5
CVE-2022-1389: On all versions of 162022-05-05
CVE-2022-1389 — Cross-Site Request Forgery in F5 Big-ip | cvebase