Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-23031


On BIG-IP FPS, ASM, and Advanced WAF versions 16.1.x before 16.1.1, 15.1.x before 15.1.4, and 14.1.x before 14.1.4.4, an XML External Entity (XXE) vulnerability exists in an undisclosed page of the F5 Advanced Web Application Firewall (Advanced WAF) and BIG-IP ASM Traffic Management User Interface (TMUI), also referred to as the Configuration utility, that allows an authenticated high-privileged attacker to read local files and force BIG-IP to send HTTP requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.


Published

2022-01-25T20:15:10.007

Last Modified

2024-11-21T06:47:50.727

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-611
  • Type: Primary
    CWE-611

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application f5 big-ip_advanced_web_application_firewall ≤ 14.1.4 Yes
Application f5 big-ip_advanced_web_application_firewall ≤ 15.1.3 Yes
Application f5 big-ip_advanced_web_application_firewall ≤ 16.1.0 Yes
Application f5 big-ip_application_security_manager ≤ 14.1.4 Yes
Application f5 big-ip_application_security_manager ≤ 15.1.3 Yes
Application f5 big-ip_application_security_manager ≤ 16.1.0 Yes
Application f5 big-ip_fraud_protection_service ≤ 14.1.4 Yes
Application f5 big-ip_fraud_protection_service ≤ 15.1.3 Yes
Application f5 big-ip_fraud_protection_service ≤ 16.1.0 Yes

References