9.8

CVE-2021-22992

On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, a malicious HTTP response to an Advanced WAF/BIG-IP ASM virtual server with Login Page configured in its policy may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may allow remote code execution (RCE), leading to complete system compromise. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

Data is provided by the National Vulnerability Database (NVD)
F5Big-ip Access Policy Manager Version >= 11.6.1 < 11.6.5.3
F5Big-ip Access Policy Manager Version >= 12.1.0 < 12.1.5.3
F5Big-ip Access Policy Manager Version >= 13.1.0 < 13.1.3.6
F5Big-ip Access Policy Manager Version >= 14.1.0 < 14.1.4
F5Big-ip Access Policy Manager Version >= 15.1.0 < 15.1.2.1
F5Big-ip Access Policy Manager Version >= 16.0.0 < 16.0.1.1
F5Big-ip Advanced Firewall Manager Version >= 11.6.1 < 11.6.5.3
F5Big-ip Advanced Firewall Manager Version >= 12.1.0 < 12.1.5.3
F5Big-ip Advanced Firewall Manager Version >= 13.1.0 < 13.1.3.6
F5Big-ip Advanced Firewall Manager Version >= 14.1.0 < 14.1.4
F5Big-ip Advanced Firewall Manager Version >= 15.1.0 < 15.1.2.1
F5Big-ip Advanced Firewall Manager Version >= 16.0.0 < 16.0.1.1
F5Big-ip Advanced Web Application Firewall Version >= 11.6.1 < 11.6.5.3
F5Big-ip Advanced Web Application Firewall Version >= 12.1.0 < 12.1.5.3
F5Big-ip Advanced Web Application Firewall Version >= 13.1.0 < 13.1.3.6
F5Big-ip Advanced Web Application Firewall Version >= 14.1.0 < 14.1.4
F5Big-ip Advanced Web Application Firewall Version >= 15.1.0 < 15.1.2.1
F5Big-ip Advanced Web Application Firewall Version >= 16.0.0 < 16.0.1.1
F5Big-ip Analytics Version >= 11.6.1 < 11.6.5.3
F5Big-ip Analytics Version >= 12.1.0 < 12.1.5.3
F5Big-ip Analytics Version >= 13.1.0 < 13.1.3.6
F5Big-ip Analytics Version >= 14.1.0 < 14.1.4
F5Big-ip Analytics Version >= 15.1.0 < 15.1.2.1
F5Big-ip Analytics Version >= 16.0.0 < 16.0.1.1
F5Big-ip Application Acceleration Manager Version >= 11.6.1 < 11.6.5.3
F5Big-ip Application Acceleration Manager Version >= 12.1.0 < 12.1.5.3
F5Big-ip Application Acceleration Manager Version >= 13.1.0 < 13.1.3.6
F5Big-ip Application Acceleration Manager Version >= 14.1.0 < 14.1.4
F5Big-ip Application Acceleration Manager Version >= 15.1.0 < 15.1.2.1
F5Big-ip Application Acceleration Manager Version >= 16.0.0 < 16.0.1.1
F5Big-ip Application Security Manager Version >= 11.6.1 < 11.6.5.3
F5Big-ip Application Security Manager Version >= 12.1.0 < 12.1.5.3
F5Big-ip Application Security Manager Version >= 13.1.0 < 13.1.3.6
F5Big-ip Application Security Manager Version >= 14.1.0 < 14.1.4
F5Big-ip Application Security Manager Version >= 15.1.0 < 15.1.2.1
F5Big-ip Application Security Manager Version >= 16.0.0 < 16.0.1.1
F5Big-ip Ddos Hybrid Defender Version >= 11.6.1 < 11.6.5.3
F5Big-ip Ddos Hybrid Defender Version >= 12.1.0 < 12.1.5.3
F5Big-ip Ddos Hybrid Defender Version >= 13.1.0 < 13.1.3.6
F5Big-ip Ddos Hybrid Defender Version >= 14.1.0 < 14.1.4
F5Big-ip Ddos Hybrid Defender Version >= 15.1.0 < 15.1.2.1
F5Big-ip Ddos Hybrid Defender Version >= 16.0.0 < 16.0.1.1
F5Big-ip Domain Name System Version >= 11.6.1 < 11.6.5.3
F5Big-ip Domain Name System Version >= 12.1.0 < 12.1.5.3
F5Big-ip Domain Name System Version >= 13.1.0 < 13.1.3.6
F5Big-ip Domain Name System Version >= 14.1.0 < 14.1.4
F5Big-ip Domain Name System Version >= 15.1.0 < 15.1.2.1
F5Big-ip Domain Name System Version >= 16.0.0 < 16.0.1.1
F5Big-ip Fraud Protection Service Version >= 11.6.1 < 11.6.5.3
F5Big-ip Fraud Protection Service Version >= 12.1.0 < 12.1.5.3
F5Big-ip Fraud Protection Service Version >= 13.1.0 < 13.1.3.6
F5Big-ip Fraud Protection Service Version >= 14.1.0 < 14.1.4
F5Big-ip Fraud Protection Service Version >= 15.1.0 < 15.1.2.1
F5Big-ip Fraud Protection Service Version >= 16.0.0 < 16.0.1.1
F5Big-ip Global Traffic Manager Version >= 11.6.1 < 11.6.5.3
F5Big-ip Global Traffic Manager Version >= 12.1.0 < 12.1.5.3
F5Big-ip Global Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5Big-ip Global Traffic Manager Version >= 14.1.0 < 14.1.4
F5Big-ip Global Traffic Manager Version >= 15.1.0 < 15.1.2.1
F5Big-ip Global Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5Big-ip Link Controller Version >= 11.6.1 < 11.6.5.3
F5Big-ip Link Controller Version >= 12.1.0 < 12.1.5.3
F5Big-ip Link Controller Version >= 13.1.0 < 13.1.3.6
F5Big-ip Link Controller Version >= 14.1.0 < 14.1.4
F5Big-ip Link Controller Version >= 15.1.0 < 15.1.2.1
F5Big-ip Link Controller Version >= 16.0.0 < 16.0.1.1
F5Big-ip Local Traffic Manager Version >= 11.6.1 < 11.6.5.3
F5Big-ip Local Traffic Manager Version >= 12.1.0 < 12.1.5.3
F5Big-ip Local Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5Big-ip Local Traffic Manager Version >= 14.1.0 < 14.1.4
F5Big-ip Local Traffic Manager Version >= 15.1.0 < 15.1.2.1
F5Big-ip Local Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5Big-ip Policy Enforcement Manager Version >= 11.6.1 < 11.6.5.3
F5Big-ip Policy Enforcement Manager Version >= 12.1.0 < 12.1.5.3
F5Big-ip Policy Enforcement Manager Version >= 13.1.0 < 13.1.3.6
F5Big-ip Policy Enforcement Manager Version >= 14.1.0 < 14.1.4
F5Big-ip Policy Enforcement Manager Version >= 15.1.0 < 15.1.2.1
F5Big-ip Policy Enforcement Manager Version >= 16.0.0 < 16.0.1.1
F5Ssl Orchestrator Version >= 11.6.1 < 11.6.5.3
F5Ssl Orchestrator Version >= 12.1.0 < 12.1.5.3
F5Ssl Orchestrator Version >= 13.1.0 < 13.1.3.6
F5Ssl Orchestrator Version >= 14.1.0 < 14.1.4
F5Ssl Orchestrator Version >= 15.1.0 < 15.1.2.1
F5Ssl Orchestrator Version >= 16.0.0 < 16.0.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 7.78% 0.912
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.