mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
494 lines
20 KiB
JSON
494 lines
20 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2022-23019",
|
||
|
"sourceIdentifier": "f5sirt@f5.com",
|
||
|
"published": "2022-01-25T20:15:09.487",
|
||
|
"lastModified": "2022-02-01T19:34:36.017",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "On BIG-IP version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x and 12.1.x, when a message routing type virtual server is configured with both Diameter Session and Router Profiles, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "En BIG-IP versiones 16.1.x anteriores a 16.1.2, 15.1.x anteriores a 15.1.4.1, 14.1.x anteriores a 14.1.4.4, y todas las versiones de 13.1.x y 12.1.x, cuando un servidor virtual de tipo de enrutamiento de mensajes est\u00e1 configurado con perfiles de sesi\u00f3n y de enrutador Diameter, el tr\u00e1fico no revelado puede causar un aumento en el uso de recursos de memoria. Nota: Las versiones de software que han alcanzado el Fin de Soporte T\u00e9cnico (EoTS) no son evaluadas"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 7.5,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 3.6
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 7.1
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 6.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-20"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"source": "f5sirt@f5.com",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-20"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "DE2F2CB2-BE96-4DC8-B336-1E9A318B4604"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "50288008-B90F-4882-80AD-2C70A1F1E2DD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "390A02DB-90FA-48DF-834E-1FD63ADFF995"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "7184A61B-7319-41BF-AD95-ECA130D59B4F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndExcluding": "16.1.2",
|
||
|
"matchCriteriaId": "3A84B00F-DE07-4310-911D-C491C5B6C4DE"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "6E32CBE0-BFDC-4DCB-A365-2F3C4D680446"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "C37ABF73-E093-498B-99F3-11D5A3908C7F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "AC3B3C8F-1D09-408E-BA0D-CB801B48FCF0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "294B0310-63D7-41F0-832D-77942B25520D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndExcluding": "16.1.2",
|
||
|
"matchCriteriaId": "B9779C2D-22DD-49E4-AA94-DD6FBF8B5F61"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "18666B67-A6EA-402B-926E-96348AB82831"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "18F2AC19-1085-48C3-B270-DD3E17A7870D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "3BC82656-7EA2-4690-A9ED-980D18949358"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "79BB6053-F55E-48B2-A6C1-16B63FB22160"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndExcluding": "16.1.2",
|
||
|
"matchCriteriaId": "623D635A-A7B3-4C98-A8D6-49692B2B1D81"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "8AF5B8C5-98F2-45B5-A877-C3666E3D6876"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "EDDC86D0-B9D6-42AE-959E-CC40C6F275EE"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "61EE2BE3-CD2C-4295-A382-B76D48760854"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "C3CF6E97-F199-4E20-BD0E-1DA03CE7EC95"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndExcluding": "16.1.2",
|
||
|
"matchCriteriaId": "6D8983C6-DE4E-43D3-A9B5-64691F6AF3D7"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "1849279E-9FB1-4D6A-8386-337F7DF151DF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "D17DCE22-99F8-422C-A414-86CFA78BA425"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "681E201F-98BE-479E-964B-7B5F9913ACAA"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "C890936B-54FE-46A9-8E1E-CB06B1777F93"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndExcluding": "16.1.2",
|
||
|
"matchCriteriaId": "1BC228C7-FDF9-4D55-A82A-F055414733A8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "F489E5B1-1EC4-4E45-8EE6-6A4FCD0F386F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "F82E9A35-A3E2-4915-BE23-B321C18BE6C3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "A5C35120-3778-4B39-8FC7-617DB3563A3A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "B13159A8-72AF-46CE-B7CC-58604EA3F933"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndIncluding": "16.1.2",
|
||
|
"matchCriteriaId": "2988E54F-B18E-4E9A-9152-A0843B5C9F3A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "01C01794-36BD-4783-B962-07000FCE4788"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "6B486BC4-2258-42FC-834E-22958ACFCA13"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "BDF71400-871F-4A3F-A7AA-5536205C993D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "8EF2D150-6031-4B94-9C98-36FCED6639D5"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndExcluding": "16.1.2",
|
||
|
"matchCriteriaId": "9219C213-C577-4560-9145-538734FF270C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "5ED5A4F4-9FFF-43D0-B17D-838D6CEDDF04"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "3FCEA7BA-FBAB-4D94-86D9-51B7F8E4C0A1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "4E9C07D8-11F2-45BB-91EE-A2E2864BD08C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "AF8311B4-2236-42BC-8B89-790309BD4E43"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndIncluding": "16.1.2",
|
||
|
"matchCriteriaId": "A01FFDA6-2263-425A-B5C0-8CE76333B6AF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "16234A51-9C86-484A-B8D5-6EFB838CB564"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "ADE1E0A6-DE70-4D46-B493-671E23EEA32D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "AAC81C56-0F6B-4A8C-8A4B-740071359097"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "C710F61F-A76C-4DED-9741-51E216975267"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndExcluding": "16.1.2",
|
||
|
"matchCriteriaId": "3E94B5FC-B1F4-4566-B058-9AEBC8960BAF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "61189D3B-8BF1-47A7-B5AC-A75E44D6BD5F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "228F7E70-F93D-40BD-9C33-2A51CB6B931F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "5FE70B9E-1165-44C9-9DD9-585A0C09FD17"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "8F6E52BA-F433-46D4-A007-161F6BCD9940"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndExcluding": "16.1.2",
|
||
|
"matchCriteriaId": "4661893C-022F-4B17-8DE9-62252E54995C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.6",
|
||
|
"matchCriteriaId": "9FBA5CDC-1989-4971-BD1B-F14E801F5017"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "13.1.0",
|
||
|
"versionEndIncluding": "13.1.4",
|
||
|
"matchCriteriaId": "F4574B7D-DFAF-4527-8E19-2E37650A1494"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "14.1.0",
|
||
|
"versionEndExcluding": "14.1.4.4",
|
||
|
"matchCriteriaId": "08C77CC7-E1C2-476D-A982-8B3D4457AD70"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "15.1.0",
|
||
|
"versionEndExcluding": "15.1.4.1",
|
||
|
"matchCriteriaId": "B10E2A03-4553-4669-BEBF-ACBBFB2C92B0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "16.1.0",
|
||
|
"versionEndExcluding": "16.1.2",
|
||
|
"matchCriteriaId": "20EB82E2-925F-4843-9A3C-A46D023A177D"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://support.f5.com/csp/article/K82793463",
|
||
|
"source": "f5sirt@f5.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|