CVE-2022-35243Improper Privilege Management in F5 Big-ip Application Security Manager

Severity
9.1CRITICALNVD
CNA8.7
EPSS
0.4%
top 36.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 4
Latest updateAug 5

Description

In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.5.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, using an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 2.3 | Impact: 6.0

Affected Packages12 packages

CVEListV5f5/big-ip13.1.013.1.x*+3
NVDf5/big-ip_analytics14.1.014.1.5+3
NVDf5/big-ip_link_controller14.1.014.1.5+3
NVDf5/big-ip_domain_name_system14.1.014.1.5+3

🔴Vulnerability Details

2
GHSA
GHSA-pq49-99m6-6f97: In BIG-IP Versions 162022-08-05
CVEList
Authenticated iControl REST in Appliance mode vulnerability CVE-2022-352432022-08-04

📋Vendor Advisories

1
F5
CVE-2022-35243: In BIG-IP Versions 162022-08-04
CVE-2022-35243 — Improper Privilege Management in F5 | cvebase