2024-12-08 03:06:42 +00:00

511 lines
21 KiB
JSON

{
"id": "CVE-2022-23030",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2022-01-25T20:15:09.963",
"lastModified": "2024-11-21T06:47:50.597",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and all versions of 13.1.x, when the BIG-IP Virtual Edition (VE) uses the ixlv driver (which is used in SR-IOV mode and requires Intel X710/XL710/XXV710 family of network adapters on the Hypervisor) and TCP Segmentation Offload configuration is enabled, undisclosed requests may cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
},
{
"lang": "es",
"value": "En las versiones 16.1.x anteriores a 16.1.2, 15.1.x anteriores a 15.1.4.1, 14.1.x anteriores a 14.1.4.5 y todas las versiones de la 13.1.x, cuando BIG-IP Virtual Edition (VE) usa el controlador ixlv (que se usa en modo SR-IOV y requiere la familia de adaptadores de red Intel X710/XL710/XXV710 en el hipervisor) y la configuraci\u00f3n TCP Segmentation Offload est\u00e1 habilitada, las peticiones no reveladas pueden causar un aumento en el uso de recursos de la CPU. Nota: Las versiones de software que han alcanzado el Fin de Soporte T\u00e9cnico (EoTS) no son evaluadas"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "f5sirt@f5.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "50288008-B90F-4882-80AD-2C70A1F1E2DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "D5286F92-3E35-4B00-AA8F-AC96449BD2F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "EB8DB7F7-61B2-4B30-BE20-16873748713A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "A0EF18CE-C9E3-4049-ABB3-72D34EC3BEA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "C37ABF73-E093-498B-99F3-11D5A3908C7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "AB20EE99-82A2-4FF9-B1C5-A0E40816AA5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "6AC0F9C1-EA16-4022-A4B9-F6780B2D8E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "F9481EEC-265F-4618-88EE-6F55286E050B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "D4C23715-2E2A-4FC6-8303-007AA2355779"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "D2A1BB14-BEB5-43DD-878D-83E51FBFD4E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "5FC62A19-61E7-4C91-826F-366CAAE3E322"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "4CDF2944-86BE-4625-A0E2-E6EA6B24CF2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "18F2AC19-1085-48C3-B270-DD3E17A7870D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "6CCAB1F6-9AD7-4743-A6B6-D42567427845"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "B75AAFF7-E434-43AD-9BDB-0F661C5B457E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "1CB5FDAC-0C23-4A36-8C3B-DE751E86F5E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "EDDC86D0-B9D6-42AE-959E-CC40C6F275EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "6B90B84E-0BAA-465E-A4D3-20902772B951"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "A905ECB4-41C3-4B28-98C1-2AA51C54C14C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "6010929B-1BE5-460C-9649-BB97F2EEF0A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "D17DCE22-99F8-422C-A414-86CFA78BA425"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "15EB0439-9C16-45C2-895D-44D6ED1A028A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "A2A1E81E-E1AF-4B0F-8440-182C58297309"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "6A7DAE74-52A3-43B7-90FA-E3009007FA37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "9B2315AF-62CA-4948-AF3A-CC2D08F63BEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "EF0981E9-9826-4D59-9FF1-709208A88B0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "213E4238-9D97-4642-81AB-6DB60D426DE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "EAC4BB37-518D-4612-8BE8-B784FC13DBD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "F82E9A35-A3E2-4915-BE23-B321C18BE6C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "A27C0FAB-2C2F-4F5E-8EF4-CC4923B848F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "63B664E8-8B36-43FA-ACF4-647AF8C8AC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "49FEB42F-B9F4-4AE5-A503-A21930F60C1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "6B486BC4-2258-42FC-834E-22958ACFCA13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "DFD7DB4C-6CA7-4C26-81AB-1F9A27F4355A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "B544AB74-B38C-4C32-A64B-2B84381A5A1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "F2287CB0-6423-4DD1-8A48-B0C624F220E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "3FCEA7BA-FBAB-4D94-86D9-51B7F8E4C0A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "FC486854-8119-4DDC-BE29-AB3394D2A214"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "AF12BE14-9788-49D2-8D02-C94E0D129D8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "F46C74F5-66DA-4B50-B0EF-80326C2D13AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "ADE1E0A6-DE70-4D46-B493-671E23EEA32D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "C5FF402E-8A6B-498F-BDB3-089EFAE55061"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "393188E8-0C28-45BA-A810-FA26C988A083"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "BC9945CF-2C6F-46D5-BC7C-59C3D4AEB4B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "228F7E70-F93D-40BD-9C33-2A51CB6B931F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "D38D907A-2071-4675-8616-733E3C96C95B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "884C63A6-D0DE-4EA0-9A12-5FCE28B220D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "B64336FE-BC6B-4303-B745-4C909D39BAE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "F4574B7D-DFAF-4527-8E19-2E37650A1494"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "30382C56-3299-4D9C-943B-46B8CECB31BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "A07248BA-DA26-4D45-8446-A6714DFB74DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "9F85ED96-4BA9-4377-A0EC-D338D6B7245B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.4",
"matchCriteriaId": "5D2210B0-898F-49A9-ABEC-55971978C2AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.4",
"matchCriteriaId": "0C4A0BD4-F4CE-43BD-A957-3812DD1DCE92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.4",
"matchCriteriaId": "A21E7BB6-70D3-45E7-8065-11A561610FC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.1",
"matchCriteriaId": "9E4382E1-13DC-4F55-AB46-9F9F4AE8BFD5"
}
]
}
]
}
],
"references": [
{
"url": "https://support.f5.com/csp/article/K53442005",
"source": "f5sirt@f5.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://support.f5.com/csp/article/K53442005",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}