4.9
CVE-2022-23031
- EPSS 0.37%
- Published 25.01.2022 20:15:10
- Last modified 21.11.2024 06:47:50
- Source f5sirt@f5.com
- Teams watchlist Login
- Open Login
On BIG-IP FPS, ASM, and Advanced WAF versions 16.1.x before 16.1.1, 15.1.x before 15.1.4, and 14.1.x before 14.1.4.4, an XML External Entity (XXE) vulnerability exists in an undisclosed page of the F5 Advanced Web Application Firewall (Advanced WAF) and BIG-IP ASM Traffic Management User Interface (TMUI), also referred to as the Configuration utility, that allows an authenticated high-privileged attacker to read local files and force BIG-IP to send HTTP requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Data is provided by the National Vulnerability Database (NVD)
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 14.1.0 <= 14.1.4
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 15.1.0 <= 15.1.3
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 16.0.0 <= 16.1.0
F5 ≫ Big-ip Application Security Manager Version >= 14.1.0 <= 14.1.4
F5 ≫ Big-ip Application Security Manager Version >= 15.1.0 <= 15.1.3
F5 ≫ Big-ip Application Security Manager Version >= 16.0.0 <= 16.1.0
F5 ≫ Big-ip Fraud Protection Service Version >= 14.1.0 <= 14.1.4
F5 ≫ Big-ip Fraud Protection Service Version >= 15.1.0 <= 15.1.3
F5 ≫ Big-ip Fraud Protection Service Version >= 16.0.0 <= 16.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.37% | 0.561 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
CWE-611 Improper Restriction of XML External Entity Reference
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.