CVE-2022-33962Improper Privilege Management in F5 Big-ip Access Policy Manager

Severity
6.7MEDIUMNVD
EPSS
0.1%
top 79.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 4
Latest updateAug 5

Description

In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, certain iRules commands may allow an attacker to bypass the access control restrictions for a self IP address, regardless of the port lockdown settings. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages12 packages

NVDf5/big-ip_link_controller14.1.014.1.5.1+4
NVDf5/big-ip_access_policy_manager14.1.014.1.5.1+4
CVEListV5f5/big-ip13.1.013.1.x*+4
NVDf5/big-ip_analytics14.1.014.1.5.1+4
NVDf5/big-ip_domain_name_system14.1.014.1.5.1+4

🔴Vulnerability Details

2
GHSA
GHSA-f8cq-8hf3-3hw9: In BIG-IP Versions 172022-08-05
CVEList
BIG-IP iRule vulnerability CVE-2022-339622022-08-04

📋Vendor Advisories

1
F5
CVE-2022-33962: In BIG-IP Versions 172022-08-04
CVE-2022-33962 — Improper Privilege Management in F5 | cvebase