mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
632 lines
27 KiB
JSON
632 lines
27 KiB
JSON
{
|
|
"id": "CVE-2021-22986",
|
|
"sourceIdentifier": "f5sirt@f5.com",
|
|
"published": "2021-03-31T15:15:15.153",
|
|
"lastModified": "2022-07-12T17:42:04.277",
|
|
"vulnStatus": "Analyzed",
|
|
"cisaExploitAdd": "2021-11-03",
|
|
"cisaActionDue": "2021-11-17",
|
|
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
|
"cisaVulnerabilityName": "F5 iControl REST unauthenticated Remote Code Execution Vulnerability",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En BIG-IP versiones 16.0.x anteriores a 16.0.1.1, versiones 15.1.x anteriores a 15.1.2.1, versiones 14.1.x anteriores a 14.1.4, versiones 13.1.x anteriores a 13.1.3.6 y versiones 12.1.x anteriores a 12.1.5.3 y BIG-IQ versiones 7.1 .0.x anteriores a 7.1.0.3 y versiones 7.0.0.x anteriores a 7.0.0.2, la interfaz REST de iControl presenta una vulnerabilidad de ejecuci\u00f3n de comandos remota no autenticada. Nota: No son evaluadas las versiones de software que han alcanzado End of Software Development (EoSD)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-918"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "14DE89CF-F8EE-4E09-9755-81F9A2F44F85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "8C3A0A32-E425-4939-A30D-95A046ABBABB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "FB553A20-D521-4A32-AD49-8FFD5A95E684"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "6ED8C663-038B-4071-9FF9-AE609F2DA4CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "A7706F70-BF89-480E-9AA6-3FE447375138"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "F76ED86B-7C48-4921-AF97-68307C181E7D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "FE73E240-2CB5-40CB-8E58-08989F5D0156"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "DD3FC6D2-5816-47C0-81AE-DED62570F090"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "F0AC967D-8D6D-44F5-88EF-A50F18979774"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "0A84A8D4-9047-46D2-9C26-03C977D47AE4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "12A27D41-6DEC-4887-A9A0-FE5AAD01FA98"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "39DDA652-065C-4AF9-A014-E0DAFF60B61B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "DB183373-A897-43DF-A544-364E59358F30"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "61BA4596-EFD4-483F-952D-4298B6CEFA9D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "6B9117DA-6AA9-4704-A092-B1D426E6370D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "6B8AB156-1960-4220-8FD2-BF7FBCD91F85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "C33FF2CF-2B91-489D-BD48-0CF9B7F0B8A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "F2442894-A473-49A5-95B6-6312C3407FE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "B462A70A-2504-4E8C-85C3-D771CDB34038"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "4AE6833C-FF7C-4249-BF98-453645EEF8D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "8ADB41C0-B8DD-4E31-AE7B-959B4DE938B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "E153E94C-35B3-46DF-96B4-0C41EC542954"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "78F5DCAD-BE4E-4D57-82CD-ADAB32691A9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "5591E2A0-9D8E-42D2-99E0-62738897762D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "51E3E0A3-8A75-43F8-8E8A-0C07345B88FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "A921F4E5-6BA7-4978-B47E-D1B173FF493F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "2BF4F8C6-1C43-4A54-9FD6-011253744FC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "8B318D4F-0D42-46CD-A5A9-02337BB1D2F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "50F6CC82-CAC7-426C-94F0-9E8E26CF61E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "7BB77EFF-A064-4475-A93C-5D5BA9313724"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "88ACF2C5-FD3D-49BE-8F32-13559A0C4A63"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "090FC11A-C085-4603-84E0-3ABD6C571E2B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "AE2899E6-ABEF-4B61-AB8D-AF060D571196"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "29A3450E-EA73-4E17-B371-92F55EF6E1A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "40239D12-142E-4D36-A89E-0F7AB91B665A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "7689C97E-D5FB-427F-9FBA-A41CA0EC7F06"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "29A0B309-E321-4F87-9C36-CAE4C213C14B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "F7C6025C-7283-4568-929B-CFA11423E179"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "D4D4B28E-43B5-4132-A4EC-B20B9F85964A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "87CA1319-92D4-4C2F-B5D4-A2E86F538007"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "9DC500F0-4D91-415E-B754-A89F730002F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "DA2D429F-42C4-4872-977A-CDABD60F92E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "BBBAD42C-06D5-437F-AB92-1DCC23C1A78B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "626E1218-868C-4328-99DA-62785C6771DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "7FE9EF68-055B-40B2-A676-C4C7FAAF77B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "B58942BF-915D-49F6-9E8A-2092D1AE572D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "59BE59F9-E6F3-4D48-89AC-6C4B5635A4E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "3DB5F9D2-C452-4469-9626-15FA11960A9C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "044F30A3-6B2E-4C38-8705-D291CD3CB287"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "BD28DA4B-F671-41B8-B231-24D28682FE8F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "4FD31B8D-10AE-4E52-8235-6EB4A12D3965"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "0A9AA005-D0E3-43FC-9D21-9DB8B5B9495D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "57388787-F9DF-4930-ACBC-F3D1DAA53190"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "1D513ACA-0D21-4CE0-88C1-DCA812F62C05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "47980A60-F9B6-47EE-AD74-4D6D03A71AD0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "58A15DC4-30F5-407C-BCE4-BC877C73480A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "94906B0A-46D2-41FC-BCFD-C66910274CD5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "0AF0D639-0210-47D0-8680-6E09F0111D5D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "86607F4A-555F-4842-AFA8-34EB7484FA2E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "B0901863-B55A-4C97-B9AC-B537D242D2BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "D14A8876-B566-4A0C-886D-DAEC77BB3689"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "45D3B1BC-568E-4BD8-8774-75203751C754"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "704DF342-2CB5-4791-BF30-294D07B53653"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "43CB3FEA-4127-460B-846E-81B6C985DEAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "85065C6E-71F2-42B8-A169-51174987B8AF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.0.0",
|
|
"versionEndExcluding": "6.1.0",
|
|
"matchCriteriaId": "5262CA69-964F-4915-8AB6-0CDB655F3432"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.0.0",
|
|
"versionEndExcluding": "7.0.0.2",
|
|
"matchCriteriaId": "669308DF-64EF-4A94-BF07-4E832BED05E2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.1.0",
|
|
"versionEndExcluding": "7.1.0.3",
|
|
"matchCriteriaId": "F668DC7D-4B88-4AD8-B31C-E5AFEF49A983"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.3",
|
|
"matchCriteriaId": "34683A56-1665-47C7-A150-246B8A86C363"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3.6",
|
|
"matchCriteriaId": "6C5DE2DA-0DAF-4DDF-9ACB-DAF301B97FB9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.4",
|
|
"matchCriteriaId": "C3FE49A0-46B4-49A1-92A4-1BEA5BF48CDF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.2.1",
|
|
"matchCriteriaId": "628A35C2-D3D8-40A2-BA55-0910A38036E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.1",
|
|
"matchCriteriaId": "14EDD6BB-094C-409F-B702-EC87867EBA17"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html",
|
|
"source": "f5sirt@f5.com",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html",
|
|
"source": "f5sirt@f5.com",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.f5.com/csp/article/K03009991",
|
|
"source": "f5sirt@f5.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |