2023-11-21 07:00:21 +00:00
{
"id" : "CVE-2023-45886" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-11-21T06:15:42.450" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:27:33.743" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-11-21 07:00:21 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The BGP daemon (bgpd) in IP Infusion ZebOS through 7.10.6 allow remote attackers to cause a denial of service by sending crafted BGP update messages containing a malformed attribute."
2023-11-21 15:00:20 +00:00
} ,
{
"lang" : "es" ,
"value" : "BGP daemon (bgpd) en IP Infusion ZebOS hasta 7.10.6 permite a atacantes remotos provocar una Denegaci\u00f3n de Servicio enviando mensajes de actualizaci\u00f3n de BGP manipulados que contienen un atributo con formato incorrecto."
2023-11-21 07:00:21 +00:00
}
] ,
2023-11-29 19:01:06 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-11-29 19:01:06 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-11-29 19:01:06 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "969C4F14-F6D6-46D6-B348-FC1463877680"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.5.0" ,
"versionEndIncluding" : "1.8.2" ,
"matchCriteriaId" : "41AD5040-1250-45F5-AB63-63F333D49BCC"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_next_cloud-native_network_functions:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.1.0" ,
"versionEndIncluding" : "1.1.1" ,
"matchCriteriaId" : "79F284A9-C17F-4230-B1B9-2F5F96784ABB"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "0360F76D-E75E-4B05-A294-B47012323ED9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "7A4607BF-41AC-4E84-A110-74E085FF0445"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "441CC945-7CA3-49C0-AE10-94725301E31D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "46BA8E8A-6ED5-4FB2-8BBC-586AA031085A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.1.0" ,
"versionEndIncluding" : "17.1.1" ,
"matchCriteriaId" : "820076A8-F163-4471-8B1E-5290BD1D6D93"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.1.0" ,
"versionEndIncluding" : "13.1.5" ,
"matchCriteriaId" : "E6018B01-048C-43BB-A78D-66910ED60CA9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.1.0" ,
"versionEndIncluding" : "14.1.5" ,
"matchCriteriaId" : "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.1.0" ,
"versionEndIncluding" : "15.1.10" ,
"matchCriteriaId" : "5D2A121F-5BD2-4263-8ED3-1DDE25B5C306"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.1.4" ,
"matchCriteriaId" : "0A4F7BAD-3EDD-4DE0-AAB7-DE5ACA34DD79"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.1.0" ,
"versionEndIncluding" : "17.1.1" ,
"matchCriteriaId" : "DF43CD3A-2C94-4663-B5D5-0327FD3E1F3D"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipinfusion:zebos:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "7.10.6" ,
"matchCriteriaId" : "3C3498D8-B387-4E26-AF1D-80D43DDC5E47"
}
]
}
]
}
] ,
2023-11-21 07:00:21 +00:00
"references" : [
{
"url" : "https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling" ,
2023-11-29 19:01:06 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
2023-11-21 07:00:21 +00:00
} ,
{
"url" : "https://my.f5.com/manage/s/article/K000137315" ,
2023-11-29 19:01:06 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-11-21 07:00:21 +00:00
} ,
{
"url" : "https://www.ipinfusion.com/doc_prod_cat/zebos/" ,
2023-11-29 19:01:06 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Product"
]
2023-11-21 07:00:21 +00:00
} ,
{
"url" : "https://www.kb.cert.org/vuls/id/347067" ,
2023-11-29 19:01:06 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"US Government Resource"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://my.f5.com/manage/s/article/K000137315" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.ipinfusion.com/doc_prod_cat/zebos/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Product"
]
} ,
{
"url" : "https://www.kb.cert.org/vuls/id/347067" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"US Government Resource"
]
2023-11-21 07:00:21 +00:00
}
]
}