cve/2023/CVE-2023-22374.md

24 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-22374](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22374)
![](https://img.shields.io/static/v1?label=Product&message=BIG-IP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-134%20Use%20of%20Externally-Controlled%20Format%20String&color=brighgreen)
### Description
A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/H4lo/awesome-IoT-security-article
- https://github.com/Threekiii/CVE
- https://github.com/UNC1739/awesome-vulnerability-research
- https://github.com/f0cus77/awesome-iot-security-resource
- https://github.com/f1tao/awesome-iot-security-resource
- https://github.com/wr0x00/Lsploit