9.8
CVE-2021-22992
- EPSS 7.78%
- Veröffentlicht 31.03.2021 17:15:13
- Zuletzt bearbeitet 21.11.2024 05:51:05
- Quelle f5sirt@f5.com
- Teams Watchlist Login
- Unerledigt Login
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, a malicious HTTP response to an Advanced WAF/BIG-IP ASM virtual server with Login Page configured in its policy may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may allow remote code execution (RCE), leading to complete system compromise. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Access Policy Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Access Policy Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Access Policy Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Access Policy Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Access Policy Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Advanced Firewall Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Advanced Firewall Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Advanced Firewall Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Advanced Firewall Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Analytics Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Analytics Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Analytics Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Analytics Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Analytics Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Analytics Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Application Acceleration Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Application Acceleration Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Application Acceleration Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Application Acceleration Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Application Security Manager Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Application Security Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Application Security Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Application Security Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Application Security Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Application Security Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Domain Name System Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Domain Name System Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Domain Name System Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Domain Name System Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Domain Name System Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Domain Name System Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Fraud Protection Service Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Fraud Protection Service Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Fraud Protection Service Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Fraud Protection Service Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Fraud Protection Service Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Fraud Protection Service Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Global Traffic Manager Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Global Traffic Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Global Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Global Traffic Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Global Traffic Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Global Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Link Controller Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Link Controller Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Link Controller Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Link Controller Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Link Controller Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Link Controller Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Local Traffic Manager Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Local Traffic Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Local Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Local Traffic Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Local Traffic Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Local Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 11.6.1 < 11.6.5.3
F5 ≫ Big-ip Policy Enforcement Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Policy Enforcement Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Policy Enforcement Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Policy Enforcement Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Ssl Orchestrator Version >= 11.6.1 < 11.6.5.3
F5 ≫ Ssl Orchestrator Version >= 12.1.0 < 12.1.5.3
F5 ≫ Ssl Orchestrator Version >= 13.1.0 < 13.1.3.6
F5 ≫ Ssl Orchestrator Version >= 14.1.0 < 14.1.4
F5 ≫ Ssl Orchestrator Version >= 15.1.0 < 15.1.2.1
F5 ≫ Ssl Orchestrator Version >= 16.0.0 < 16.0.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 7.78% | 0.912 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.