mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
448 lines
18 KiB
JSON
448 lines
18 KiB
JSON
{
|
|
"id": "CVE-2023-22374",
|
|
"sourceIdentifier": "f5sirt@f5.com",
|
|
"published": "2023-02-01T18:15:11.363",
|
|
"lastModified": "2023-10-04T03:15:10.497",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\n\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "f5sirt@f5.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 6.0
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 6.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "f5sirt@f5.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-134"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-134"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "BEFCEE4A-EFF7-4622-964D-29706B0D0788"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "65BD1840-28C2-42B7-BE75-081DE24081A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "3D511799-6CEE-4337-BF66-38D7AF4D68C5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3E688B1-28C4-4F9A-9474-381FD22E792D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD637AF5-F7D1-428F-955E-16756B7476E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "32BBAAC4-BCC4-4A84-A579-4356EF78AA22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "AA72ED00-F966-4762-9025-3DB63A1640A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "0279F4AF-C297-47B3-A1DD-C99DF6AAD215"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "200AC72D-719D-4663-BE05-C9C7826DEA68"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8332960-4AAE-4101-8FFF-2D07B6479BD4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "4B721D9E-AD2F-44C9-9163-3785AA1A8441"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "2685F058-2BEF-4189-BFBC-2F223C776A63"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "79DD896D-ABC7-485B-8810-39BB65DAF76C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "129F1B0B-44E4-4F67-B0B6-43CD2734F30A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA0A9081-15D2-44F7-B66E-5C594F7C8066"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "DC06C851-23E7-4793-9BB0-A1172B78B15F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "1AAE414B-CD2C-4FE1-9124-6F43040DDFB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2CF66FD8-CDA5-4E44-8A0D-9FF07E8C1E05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDEBE106-40F1-439C-8154-187D89988C3E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "AEFB9B30-9A07-4D28-B3EA-267D257B7E89"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "764E6777-2C42-46FE-A266-ABBEB05D0F1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "D90494BC-DEBB-47A2-9794-BAC0BF670A92"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D5FDBD38-369B-4007-8D9A-B65B83B2AABD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9AB53DF-7335-462E-B8CD-44DF0DCE3826"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "C278A7AA-1CA3-432D-9C22-772A288CC178"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "785DD62D-CA21-40EC-8AF0-8CC36CCB8304"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "AA133203-B4FE-415D-B9C8-7CDE1A7895D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A8C73DC4-D85A-49A1-81BD-E9D145E42FF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "019D49C1-4A4D-40EE-8242-A649BE03E38B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "E943A8AF-F993-4C1C-ADF1-06519694E4C5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "C6A12A83-966B-4B6D-AE49-C1696819E548"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC4E36FE-C4C7-4C00-A65A-41F50FCE017D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "B46626AD-CF6B-4A1C-8103-0A616C053E5D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "4842CD17-44B8-456D-9AC7-A295B4D4DBEA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F933F2D2-1C1D-43F0-9BD2-4699716E4A94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D0954BD-CC9C-448F-A9C1-3FB71AB27D6D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "FDC74428-66DF-4A88-A6F5-064160B4C72C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "44E0FC7E-30C1-49D7-9B89-4CB747B28CBD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "1647DB93-A49C-4A04-B181-3465427D4B17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26873D65-5406-45AF-A7F4-14AF2C55D368"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7B147BB-1B2E-4F40-9FA7-1165B8F0B60D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "8155903D-1A5F-482E-B356-526E9A973BBC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "F3938C6C-6855-4873-89EA-4C8B8EFD571C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "0E52120D-FBF7-4687-87A8-BC4AE07DC734"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E37750C-50F3-480A-AA40-23D59F50E4B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "73FB842B-33B1-4AD4-AC61-47192A87A785"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "04FFF651-F115-4591-BA61-E099DE307168"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "FC136CEA-2431-4D53-B898-E245826A9995"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "1CD177FA-262E-4874-9850-4E8525181ACE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F754F6FC-2A29-453F-9E9B-39C779830562"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "509A4307-3EC4-4AE7-AF72-3C2B3CF9E754"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.4.6",
|
|
"versionEndIncluding": "14.1.5",
|
|
"matchCriteriaId": "854D89CF-0E69-4BA9-A881-02673E3D91F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.5.1",
|
|
"versionEndIncluding": "15.1.8",
|
|
"matchCriteriaId": "D03D7294-C5CD-4EC1-8200-A998AED7F8E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.1.2.2",
|
|
"versionEndIncluding": "16.1.3",
|
|
"matchCriteriaId": "D2DACFE8-5E0B-49EC-894E-175591E9C775"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:13.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC4686BF-A9FA-4770-BD06-74BA4CA49FCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88B13312-1958-4B5C-BD4B-2075F6BF8C98"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://my.f5.com/manage/s/article/K000130415",
|
|
"source": "f5sirt@f5.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |