CVE-2022-26071Use of Insufficiently Random Values in F5 Big-ip Global Traffic Manager

Severity
7.5HIGHNVD
CNA7.4
EPSS
1.5%
top 19.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 5
Latest updateMay 6

Description

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, a flaw in the way reply ICMP packets are limited in the Traffic Management Microkernel (TMM) allows an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Note: Software versions which have reached End of Technical Support

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages12 packages

CVEListV5f5/big-ip16.1.x16.1.2.2+5
NVDf5/big-ip_analytics31 versions+30
NVDf5/big-ip_link_controller31 versions+30

🔴Vulnerability Details

2
GHSA
GHSA-6rjr-wmhf-5x38: On F5 BIG-IP 162022-05-06
CVEList
CVE-2022-26071: On F5 BIG-IP 162022-05-05

📋Vendor Advisories

1
F5
CVE-2022-26071: On F5 BIG-IP 162022-05-05
CVE-2022-26071 — Use of Insufficiently Random Values | cvebase