{ "id": "CVE-2023-45886", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-21T06:15:42.450", "lastModified": "2024-11-21T08:27:33.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The BGP daemon (bgpd) in IP Infusion ZebOS through 7.10.6 allow remote attackers to cause a denial of service by sending crafted BGP update messages containing a malformed attribute." }, { "lang": "es", "value": "BGP daemon (bgpd) en IP Infusion ZebOS hasta 7.10.6 permite a atacantes remotos provocar una Denegaci\u00f3n de Servicio enviando mensajes de actualizaci\u00f3n de BGP manipulados que contienen un atributo con formato incorrecto." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "969C4F14-F6D6-46D6-B348-FC1463877680" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.5.0", "versionEndIncluding": "1.8.2", "matchCriteriaId": "41AD5040-1250-45F5-AB63-63F333D49BCC" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_next_cloud-native_network_functions:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.1.0", "versionEndIncluding": "1.1.1", "matchCriteriaId": "79F284A9-C17F-4230-B1B9-2F5F96784ABB" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.1.0", "versionEndIncluding": "13.1.5", "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "14.1.0", "versionEndIncluding": "14.1.5", "matchCriteriaId": "7A4607BF-41AC-4E84-A110-74E085FF0445" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.1.0", "versionEndIncluding": "15.1.10", "matchCriteriaId": "441CC945-7CA3-49C0-AE10-94725301E31D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.1.0", "versionEndIncluding": "16.1.4", "matchCriteriaId": "46BA8E8A-6ED5-4FB2-8BBC-586AA031085A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.1.0", "versionEndIncluding": "17.1.1", "matchCriteriaId": "820076A8-F163-4471-8B1E-5290BD1D6D93" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.1.0", "versionEndIncluding": "13.1.5", "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "14.1.0", "versionEndIncluding": "14.1.5", "matchCriteriaId": "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "15.1.0", "versionEndIncluding": "15.1.10", "matchCriteriaId": "5D2A121F-5BD2-4263-8ED3-1DDE25B5C306" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.1.0", "versionEndIncluding": "16.1.4", "matchCriteriaId": "0A4F7BAD-3EDD-4DE0-AAB7-DE5ACA34DD79" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.1.0", "versionEndIncluding": "17.1.1", "matchCriteriaId": "DF43CD3A-2C94-4663-B5D5-0327FD3E1F3D" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ipinfusion:zebos:*:*:*:*:*:*:*:*", "versionEndIncluding": "7.10.6", "matchCriteriaId": "3C3498D8-B387-4E26-AF1D-80D43DDC5E47" } ] } ] } ], "references": [ { "url": "https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://my.f5.com/manage/s/article/K000137315", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.ipinfusion.com/doc_prod_cat/zebos/", "source": "cve@mitre.org", "tags": [ "Product" ] }, { "url": "https://www.kb.cert.org/vuls/id/347067", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ] }, { "url": "https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "https://my.f5.com/manage/s/article/K000137315", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.ipinfusion.com/doc_prod_cat/zebos/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ] }, { "url": "https://www.kb.cert.org/vuls/id/347067", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ] } ] }