CVE-2021-23038
Published on: 09/14/2021 12:00:00 AM UTC
Last Modified on: 09/27/2021 03:43:00 PM UTC
Certain versions of Big-ip Access Policy Manager from F5 contain the following vulnerability:
On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.2, 13.1.x before 13.1.4.1, and all versions of 12.1.x, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
- CVE-2021-23038 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
CVSS3 Score: 9 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 3.5 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | support.f5.com text/html |
![]() |
Related QID Numbers
- 375903 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) Traffic Management User Interface (TMUI) Cross-Site Scripting (XSS) Vulnerability (K61643620)
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|