CVE-2022-41800

Severity CVSS v4.0:
Pending analysis
Type:
CWE-77 Command Injection
Publication date:
07/12/2022
Last modified:
07/11/2023

Description

<br /> In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.  <br /> <br /> Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 13.1.0 (including) 13.1.5 (including)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 14.1.0 (including) 14.1.5 (including)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 15.1.0 (including) 15.1.8 (including)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 16.1.0 (including) 16.1.3 (including)
cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 13.1.0 (including) 17.0.0 (including)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 13.1.0 (including) 13.1.5 (including)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 14.1.0 (including) 14.1.5 (including)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 15.1.0 (including) 15.1.8 (including)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 16.1.0 (including) 16.1.3 (including)
cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 13.1.0 (including) 13.1.5 (including)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 14.1.0 (including) 14.1.5 (including)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 15.1.0 (including) 15.1.8 (including)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 16.1.0 (including) 16.1.3 (including)


References to Advisories, Solutions, and Tools