CVE-2022-23021
Published Jan 25, 2022
Last updated 3 years ago
Overview
- Description
- On BIG-IP version 16.1.x before 16.1.2, when any of the following configurations are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate: HTTP redirect rule in an LTM policy, BIG-IP APM Access Profile, and Explicit HTTP Proxy in HTTP Profile. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
- Source
- f5sirt@f5.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:C
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A84B00F-DE07-4310-911D-C491C5B6C4DE", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9779C2D-22DD-49E4-AA94-DD6FBF8B5F61", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "623D635A-A7B3-4C98-A8D6-49692B2B1D81", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D8983C6-DE4E-43D3-A9B5-64691F6AF3D7", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BC228C7-FDF9-4D55-A82A-F055414733A8", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C2F08B4-BE3D-45F0-8581-D4B3A5487F6A", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9219C213-C577-4560-9145-538734FF270C", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "000B88C9-BEC5-40A0-B4A3-547825D92E83", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E94B5FC-B1F4-4566-B058-9AEBC8960BAF", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4661893C-022F-4B17-8DE9-62252E54995C", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20EB82E2-925F-4843-9A3C-A46D023A177D", "versionEndExcluding": "16.1.2", "versionStartIncluding": "16.1.0" } ], "operator": "OR" } ] } ]