cvelist/2022/1xxx/CVE-2022-1388.json
2022-05-12 18:02:09 +00:00

132 lines
5.4 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-05-04T14:00:00.000Z",
"ID": "CVE-2022-1388",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BIG-IP",
"version": {
"version_data": [
{
"version_affected": "!>=",
"version_name": "17.0.x",
"version_value": "17.0.0"
},
{
"version_affected": "<",
"version_name": "16.1.x",
"version_value": "16.1.2.2"
},
{
"version_affected": "<",
"version_name": "15.1.x",
"version_value": "15.1.5.1"
},
{
"version_affected": "<",
"version_name": "14.1.x",
"version_value": "14.1.4.6"
},
{
"version_affected": "<",
"version_name": "13.1.x",
"version_value": "13.1.5"
},
{
"version_affected": "<=",
"version_name": "12.1.x",
"version_value": "12.1.6"
},
{
"version_affected": "<=",
"version_name": "11.6.x",
"version_value": "11.6.5"
}
]
}
}
]
},
"vendor_name": "F5"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-306 Missing Authentication for Critical Function"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://support.f5.com/csp/article/K23605346",
"name": "https://support.f5.com/csp/article/K23605346"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}