CVE-2023-22374Use of Externally-Controlled Format String in F5 Big-ip Application Security Manager

Severity
8.5HIGHNVD
EPSS
3.3%
top 12.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 1

Description

A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 1.8 | Impact: 6.0

Affected Packages13 packages

NVDf5/big-ip_application_security_manager14.1.4.614.1.5+4
CVEListV5f5/big-ip17.0.017.1.0+4
NVDf5/big-ip_analytics14.1.4.614.1.5+4
NVDf5/big-ip_link_controller14.1.4.614.1.5+4
NVDf5/big-ip_ssl_orchestrator14.1.4.614.1.5+4

🔴Vulnerability Details

2
CVEList
iControl SOAP vulnerability2023-02-01
GHSA
GHSA-j683-v94g-h65c: In BIG-IP starting in versions 172023-02-01

📋Vendor Advisories

1
F5
CVE-2023-22374: A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOA...2023-02-01
CVE-2023-22374 — F5 vulnerability | cvebase