Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEFCEE4A-EFF7-4622-964D-29706B0D0788", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "65BD1840-28C2-42B7-BE75-081DE24081A3", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D511799-6CEE-4337-BF66-38D7AF4D68C5", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "B3E688B1-28C4-4F9A-9474-381FD22E792D", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD637AF5-F7D1-428F-955E-16756B7476E0", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "32BBAAC4-BCC4-4A84-A579-4356EF78AA22", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA72ED00-F966-4762-9025-3DB63A1640A3", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0279F4AF-C297-47B3-A1DD-C99DF6AAD215", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "200AC72D-719D-4663-BE05-C9C7826DEA68", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8332960-4AAE-4101-8FFF-2D07B6479BD4", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B721D9E-AD2F-44C9-9163-3785AA1A8441", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "2685F058-2BEF-4189-BFBC-2F223C776A63", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "79DD896D-ABC7-485B-8810-39BB65DAF76C", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "129F1B0B-44E4-4F67-B0B6-43CD2734F30A", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA0A9081-15D2-44F7-B66E-5C594F7C8066", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC06C851-23E7-4793-9BB0-A1172B78B15F", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AAE414B-CD2C-4FE1-9124-6F43040DDFB1", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2CF66FD8-CDA5-4E44-8A0D-9FF07E8C1E05", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "EDEBE106-40F1-439C-8154-187D89988C3E", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEFB9B30-9A07-4D28-B3EA-267D257B7E89", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "764E6777-2C42-46FE-A266-ABBEB05D0F1A", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "D90494BC-DEBB-47A2-9794-BAC0BF670A92", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FDBD38-369B-4007-8D9A-B65B83B2AABD", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E9AB53DF-7335-462E-B8CD-44DF0DCE3826", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "matchCriteriaId": "C278A7AA-1CA3-432D-9C22-772A288CC178", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "matchCriteriaId": "785DD62D-CA21-40EC-8AF0-8CC36CCB8304", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA133203-B4FE-415D-B9C8-7CDE1A7895D9", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8C73DC4-D85A-49A1-81BD-E9D145E42FF6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "019D49C1-4A4D-40EE-8242-A649BE03E38B", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "E943A8AF-F993-4C1C-ADF1-06519694E4C5", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6A12A83-966B-4B6D-AE49-C1696819E548", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC4E36FE-C4C7-4C00-A65A-41F50FCE017D", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "B46626AD-CF6B-4A1C-8103-0A616C053E5D", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "4842CD17-44B8-456D-9AC7-A295B4D4DBEA", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F933F2D2-1C1D-43F0-9BD2-4699716E4A94", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D0954BD-CC9C-448F-A9C1-3FB71AB27D6D", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDC74428-66DF-4A88-A6F5-064160B4C72C", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "44E0FC7E-30C1-49D7-9B89-4CB747B28CBD", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "1647DB93-A49C-4A04-B181-3465427D4B17", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "26873D65-5406-45AF-A7F4-14AF2C55D368", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7B147BB-1B2E-4F40-9FA7-1165B8F0B60D", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "8155903D-1A5F-482E-B356-526E9A973BBC", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3938C6C-6855-4873-89EA-4C8B8EFD571C", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E52120D-FBF7-4687-87A8-BC4AE07DC734", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4E37750C-50F3-480A-AA40-23D59F50E4B5", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "73FB842B-33B1-4AD4-AC61-47192A87A785", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "04FFF651-F115-4591-BA61-E099DE307168", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC136CEA-2431-4D53-B898-E245826A9995", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD177FA-262E-4874-9850-4E8525181ACE", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F754F6FC-2A29-453F-9E9B-39C779830562", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "509A4307-3EC4-4AE7-AF72-3C2B3CF9E754", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "854D89CF-0E69-4BA9-A881-02673E3D91F3", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.1.4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "D03D7294-C5CD-4EC1-8200-A998AED7F8E5", "versionEndIncluding": "15.1.8", "versionStartIncluding": "15.1.5.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2DACFE8-5E0B-49EC-894E-175591E9C775", "versionEndIncluding": "16.1.3", "versionStartIncluding": "16.1.2.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:13.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "BC4686BF-A9FA-4770-BD06-74BA4CA49FCC", "vulnerable": true}, {"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "88B13312-1958-4B5C-BD4B-2075F6BF8C98", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\n\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n"}, {"lang": "es", "value": "Existe una vulnerabilidad de cadena de formato en iControl SOAP que permite a un atacante autenticado bloquear el proceso CGI de iControl SOAP o, potencialmente, ejecutar c\u00f3digo arbitrario. En el modo de dispositivo BIG-IP, una explotaci\u00f3n exitosa de esta vulnerabilidad puede permitir al atacante cruzar un l\u00edmite de seguridad. Nota: Las versiones de software que han llegado al final del soporte t\u00e9cnico (EoTS) no se eval\u00faan."}], "id": "CVE-2023-22374", "lastModified": "2024-11-21T07:44:39.350", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 6.0, "source": "f5sirt@f5.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Secondary"}]}, "published": "2023-02-01T18:15:11.363", "references": [{"source": "f5sirt@f5.com", "tags": ["Vendor Advisory"], "url": "https://my.f5.com/manage/s/article/K000130415"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://my.f5.com/manage/s/article/K000130415"}], "sourceIdentifier": "f5sirt@f5.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-134"}], "source": "f5sirt@f5.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-134"}], "source": "nvd@nist.gov", "type": "Secondary"}]}