6.5
CVE-2023-22283
- EPSS 0.07%
- Published 01.02.2023 18:15:10
- Last modified 21.11.2024 07:44:27
- Source f5sirt@f5.com
- Teams watchlist Login
- Open Login
On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Data is provided by the National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager SwEditionclients Version >= 7.2.2 < 7.2.3.1
F5 ≫ Big-ip Access Policy Manager Version >= 13.1.0 <= 13.1.5
F5 ≫ Big-ip Access Policy Manager Version >= 14.1.0 <= 14.1.5
F5 ≫ Big-ip Access Policy Manager Version >= 15.1.0 <= 15.1.8
F5 ≫ Big-ip Access Policy Manager Version >= 16.1.0 <= 16.1.3
F5 ≫ Big-ip Access Policy Manager Version >= 17.0.0 < 17.0.0.2
F5 ≫ Big-ip Edge Version- SwEditionclients SwPlatformwindows
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.195 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
f5sirt@f5.com | 6.5 | 0.6 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.5 | 0.6 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.