CVE-2022-23023
Published on: 01/25/2022 12:00:00 AM UTC
Last Modified on: 02/01/2022 06:22:00 PM UTC
Certain versions of Big-ip Access Policy Manager from F5 contain the following vulnerability:
On BIG-IP version 16.1.x before 16.1.2.1, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all versions of 13.1.x and 12.1.x, and BIG-IQ all versions of 8.x and 7.x, undisclosed requests by an authenticated iControl REST user can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
- CVE-2022-23023 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 4 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | support.f5.com text/html |
![]() |
Related QID Numbers
- 376286 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) iControl REST Vulnerability (K11742742)
- 376294 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) iControl REST Vulnerability (K11742742)
- 376322 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) iControl REST Vulnerability (K11742742)
- 376328 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) iControl REST Vulnerability (K11742742)
- 376352 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) iControl REST Vulnerability (K11742742)
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
F5 Networks BIG-IP の iControl REST の処理にサービスを妨害される問題 (CVE-2022-23023) [41104] sid.softek.jp/content/show/4… #SIDfm #脆弱性情報 | 2022-01-21 06:34:22 |
![]() |
CVE-2022-23023 : On BIG-IP version 16.1.x before 16.1.2.1, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all ve… twitter.com/i/web/status/1… | 2022-01-25 20:12:13 |
![]() |
CVE-2022-23023 | 2022-01-25 21:39:03 |