CVE-2022-23017NULL Pointer Dereference in F5 Big-ip Domain Name System

Severity
7.5HIGHNVD
EPSS
0.7%
top 27.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 25
Latest updateJul 11

Description

On BIG-IP version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and all versions of 13.1.x, when a virtual server is configured with a DNS profile with the Rapid Response Mode setting enabled and is configured on a BIG-IP system, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages12 packages

NVDf5/big-ip_domain_name_system14.1.014.1.4.5+3
NVDf5/big-ip_local_traffic_manager14.1.014.1.4.5+3
NVDf5/big-ip_global_traffic_manager14.1.014.1.4.5+3
NVDf5/big-ip_analytics14.1.014.1.4.5+3
NVDf5/big-ip_link_controller14.1.014.1.4.5+3

🔴Vulnerability Details

2
GHSA
GHSA-mw2g-8699-96xp: On BIG-IP version 162022-01-26
CVEList
CVE-2022-23017: On BIG-IP version 162022-01-25

💥Exploits & PoCs

1
Exploit-DB
Nginx 1.20.0 - Denial of Service (DOS)2022-07-11

📋Vendor Advisories

3
Oracle
Oracle Oracle Blockchain Platform Risk Matrix: Backend (nginx) — CVE-2021-230172022-04-15
F5
CVE-2022-23017: On BIG-IP version 162022-01-25
Oracle
Oracle Oracle GoldenGate Risk Matrix: GG Market Place for Support (nginx) — CVE-2021-230172022-01-15
CVE-2022-23017 — NULL Pointer Dereference in F5 | cvebase