CVE-2022-35728Insufficient Session Expiration in F5 Big-ip

Severity
9.8CRITICALNVD
CNA8.1
EPSS
0.7%
top 28.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 4
Latest updateAug 5

Description

In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, and BIG-IQ version 8.x before 8.2.0 and all versions of 7.x, an authenticated user's iControl REST token may remain valid for a limited time after logging out from the Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages14 packages

CVEListV5f5/big-ip13.1.013.1.x*+4
NVDf5/big-ip_analytics14.1.014.1.5.1+4
NVDf5/big-ip_link_controller14.1.014.1.5.1+4
NVDf5/big-ip_domain_name_system14.1.014.1.5.1+4
NVDf5/big-ip_access_policy_manager14.1.014.1.5.1+4

🔴Vulnerability Details

2
GHSA
GHSA-h24c-cc8x-fq2g: In BIG-IP Versions 172022-08-05
CVEList
iControl REST vulnerability CVE-2022-357282022-08-04

📋Vendor Advisories

1
F5
CVE-2022-35728: In BIG-IP Versions 172022-08-04
CVE-2022-35728 — Insufficient Session Expiration in F5 | cvebase