CVE-2023-22422
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
01/02/2023
Last modified:
07/11/2023
Description
On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, when a HTTP profile with the non-default Enforcement options of Enforce HTTP Compliance and Unknown Methods: Reject are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br />
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.3.3 (excluding) |
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 17.0.0 (including) | 17.0.0.2 (excluding) |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.3.3 (excluding) |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 17.0.0 (including) | 17.0.0.2 (excluding) |
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.3.3 (excluding) |
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 17.0.0 (including) | 17.0.0.2 (excluding) |
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.3.3 (excluding) |
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 17.0.0 (including) | 17.0.0.2 (excluding) |
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.3.3 (excluding) |
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 17.0.0 (including) | 17.0.0.2 (excluding) |
| cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.3.3 (excluding) |
| cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* | 17.0.0 (including) | 17.0.0.2 (excluding) |
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.3.3 (excluding) |
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 17.0.0 (including) | 17.0.0.2 (excluding) |
| cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.3.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



