7.5
CVE-2021-22974
- EPSS 0.33%
- Published 12.02.2021 17:15:14
- Last modified 21.11.2024 05:51:02
- Source f5sirt@f5.com
- Teams watchlist Login
- Open Login
On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.6 and all versions of BIG-IQ 7.x and 6.x, an authenticated attacker with access to iControl REST over the control plane may be able to take advantage of a race condition to execute commands with an elevated privilege level. This vulnerability is due to an incomplete fix for CVE-2017-6167. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Data is provided by the National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Access Policy Manager Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Access Policy Manager Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Access Policy Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 13.1.0 < 13.1.3.5
F5 ≫ Big-ip Advanced Firewall Manager Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Advanced Firewall Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Analytics Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Analytics Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Analytics Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Analytics Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Application Acceleration Manager Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Application Acceleration Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Application Security Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Application Security Manager Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Application Security Manager Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Application Security Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Domain Name System Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Domain Name System Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Domain Name System Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Domain Name System Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Fraud Protection Service Version >= 13.1.0 < 13.1.3.5
F5 ≫ Big-ip Fraud Protection Service Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Fraud Protection Service Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Fraud Protection Service Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Global Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Global Traffic Manager Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Global Traffic Manager Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Global Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Link Controller Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Link Controller Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Link Controller Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Link Controller Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Local Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Local Traffic Manager Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Local Traffic Manager Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Local Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Policy Enforcement Manager Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Policy Enforcement Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Ssl Orchestrator Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Ssl Orchestrator Version >= 14.1.0 < 14.1.3.1
F5 ≫ Big-ip Ssl Orchestrator Version >= 15.1.0 < 15.1.2
F5 ≫ Big-ip Ssl Orchestrator Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-iq Centralized Management Version >= 6.0.0 <= 6.1.0
F5 ≫ Big-iq Centralized Management Version >= 7.0.0 <= 7.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.33% | 0.525 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6 | 6.8 | 6.4 |
AV:N/AC:M/Au:S/C:P/I:P/A:P
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.