5.3
CVE-2022-27181
- EPSS 0.63%
- Veröffentlicht 05.05.2022 17:15:12
- Zuletzt bearbeitet 21.11.2024 06:55:21
- Quelle f5sirt@f5.com
- CVE-Watchlists
- Unerledigt
On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when APM is configured on a virtual server and the associated access profile is configured with APM AAA NTLM Auth, undisclosed requests can cause an increase in internal resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager Version13.1.0
F5 ≫ Big-ip Access Policy Manager Version13.1.1
F5 ≫ Big-ip Access Policy Manager Version13.1.3
F5 ≫ Big-ip Access Policy Manager Version13.1.4
F5 ≫ Big-ip Access Policy Manager Version13.1.5
F5 ≫ Big-ip Access Policy Manager Version14.1.0
F5 ≫ Big-ip Access Policy Manager Version14.1.2
F5 ≫ Big-ip Access Policy Manager Version14.1.3
F5 ≫ Big-ip Access Policy Manager Version14.1.4
F5 ≫ Big-ip Access Policy Manager Version15.1.0
F5 ≫ Big-ip Access Policy Manager Version15.1.1
F5 ≫ Big-ip Access Policy Manager Version15.1.2
F5 ≫ Big-ip Access Policy Manager Version15.1.3
F5 ≫ Big-ip Access Policy Manager Version15.1.4
F5 ≫ Big-ip Access Policy Manager Version15.1.5
F5 ≫ Big-ip Access Policy Manager Version16.1.0
F5 ≫ Big-ip Access Policy Manager Version16.1.1
F5 ≫ Big-ip Access Policy Manager Version16.1.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.63% | 0.693 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
| f5sirt@f5.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.