CVE-2024-22093
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
14/02/2024
Last modified:
05/09/2025
Description
When running in appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint on multi-bladed systems. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Impact
Base Score 3.x
8.70
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.9 (excluding) |
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.4 (excluding) |
| cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:* | 8.0.0 (including) | 8.3.0 (including) |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.9 (excluding) |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.4 (excluding) |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.9 (excluding) |
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.4 (excluding) |
| cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.9 (excluding) |
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.4 (excluding) |
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.9 (excluding) |
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 16.1.0 (including) | 16.1.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



