CVE-2022-23027
Published on: 01/25/2022 12:00:00 AM UTC
Last Modified on: 02/01/2022 05:40:00 PM UTC
Certain versions of Big-ip Access Policy Manager from F5 contain the following vulnerability:
On BIG-IP versions 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, 13.1.x beginning in 13.1.3.6, 12.1.5.3-12.1.6, and 11.6.5.2, when a FastL4 profile and an HTTP, FIX, and/or hash persistence profile are configured on the same virtual server, undisclosed requests can cause the virtual server to stop processing new client connections. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
- CVE-2022-23027 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 5.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | LOW |
CVSS2 Score: 5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | support.f5.com text/html |
![]() |
Related QID Numbers
- 376279 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) BIG-IP virtual server with FastL4 profile Vulnerability (K30573026)
- 376306 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) BIG-IP virtual server with FastL4 profile Vulnerability (K30573026)
- 376308 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) BIG-IP virtual server with FastL4 profile Vulnerability (K30573026)
- 376342 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) BIG-IP virtual server with FastL4 profile Vulnerability (K30573026)
- 376355 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) BIG-IP virtual server with FastL4 profile Vulnerability (K30573026)
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
F5 Networks BIG-IP の FastL4 profile の処理にサービスを妨害される問題 (CVE-2022-23027) [41105] sid.softek.jp/content/show/4… #SIDfm #脆弱性情報 | 2022-01-21 07:04:19 |
![]() |
CVE-2022-23027 : On BIG-IP versions 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, 13.1.x beginning in 13.1.3.6, 12.… twitter.com/i/web/status/1… | 2022-01-25 20:13:09 |
![]() |
CVE-2022-23027 | 2022-01-25 21:39:08 |