Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-23028


On BIG-IP AFM version 16.x before 16.1.0, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all versions of 13.1.x, when global AFM SYN cookie protection (TCP Half Open flood vector) is activated in the AFM Device Dos or DOS profile, certain types of TCP connections will fail. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.


Published

2022-01-25T20:15:09.873

Last Modified

2024-11-21T06:47:50.310

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-682
  • Type: Primary
    CWE-682

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application f5 big-ip_advanced_firewall_manager ≤ 13.1.4 Yes
Application f5 big-ip_advanced_firewall_manager ≤ 14.1.4 Yes
Application f5 big-ip_advanced_firewall_manager ≤ 15.1.4 Yes

References