Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-23028


On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.2, and 13.1.x before 13.1.4, when JSON content profiles are configured for URLs as part of an F5 Advanced Web Application Firewall (WAF)/BIG-IP ASM security policy and applied to a virtual server, undisclosed requests may cause the BIG-IP ASM bd process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.


Published

2021-09-14T21:15:07.663

Last Modified

2024-11-21T05:51:10.793

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application f5 big-ip_advanced_web_application_firewall ≤ 13.1.3.6 Yes
Application f5 big-ip_advanced_web_application_firewall ≤ 14.1.4.1 Yes
Application f5 big-ip_advanced_web_application_firewall < 15.1.3.1 Yes
Application f5 big-ip_advanced_web_application_firewall 16.0.1 Yes
Application f5 big-ip_application_security_manager ≤ 13.1.3.6 Yes
Application f5 big-ip_application_security_manager ≤ 14.1.4.1 Yes
Application f5 big-ip_application_security_manager < 15.1.3.1 Yes
Application f5 big-ip_application_security_manager 16.0.1 Yes

References