René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

147 lines
4.8 KiB
JSON

{
"id": "CVE-2023-22283",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-02-01T18:15:10.727",
"lastModified": "2023-02-09T15:00:29.360",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.6,
"impactScore": 5.9
},
{
"source": "f5sirt@f5.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
},
{
"source": "f5sirt@f5.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:clients:*:*:*",
"versionStartIncluding": "7.2.2",
"versionEndExcluding": "7.2.3.1",
"matchCriteriaId": "8424FB08-840E-4EE1-9F4B-E60705A4F466"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.5",
"matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.8",
"matchCriteriaId": "9568C6BD-0244-4220-8C95-DBF6C13526F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.3",
"matchCriteriaId": "607663E0-4D10-4C6C-8184-29A3EC921A83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0.0",
"versionEndExcluding": "17.0.0.2",
"matchCriteriaId": "E84986CC-EF54-4404-B559-3FF946C67BB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_edge:-:*:*:*:clients:windows:*:*",
"matchCriteriaId": "1AD7F83E-183B-48A5-AAEA-9252CE86BC2C"
}
]
}
]
}
],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K07143733",
"source": "f5sirt@f5.com",
"tags": [
"Vendor Advisory"
]
}
]
}