CVE-2022-26415

Severity CVSS v4.0:
Pending analysis
Type:
CWE-77 Command Injection
Publication date:
05/05/2022
Last modified:
24/01/2023

Description

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 12.1.0 (including) 12.1.6 (including)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 13.1.0 (including) 13.1.5 (excluding)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 14.1.0 (including) 14.1.4.6 (excluding)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 15.1.0 (including) 15.1.5.1 (excluding)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 16.1.0 (including) 16.1.2.2 (excluding)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 12.1.0 (including) 12.1.6 (including)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 13.1.0 (including) 13.1.5 (excluding)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 14.1.0 (including) 14.1.4.6 (excluding)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 15.1.0 (including) 15.1.5.1 (excluding)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 16.1.0 (including) 16.1.2.2 (excluding)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 12.1.0 (including) 12.1.6 (including)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 13.1.0 (including) 13.1.5 (excluding)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 14.1.0 (including) 14.1.4.6 (excluding)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 15.1.0 (including) 15.1.5.1 (excluding)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 16.1.0 (including) 16.1.2.2 (excluding)


References to Advisories, Solutions, and Tools