On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://support.f5.com/csp/article/K23605346 | Mitigation Vendor Advisory |
https://www.secpod.com/blog/critical-f5-big-ip-remote-code-execution-vulnerability-patch-now/ | Exploit Mitigation Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: f5
Published: 2022-05-05T00:00:00
Updated: 2023-10-18T00:25:05.758039
Reserved: 2022-04-19T00:00:00
Link: CVE-2022-1388
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-05T17:15:10.570
Modified: 2023-11-02T01:54:15.380
Link: CVE-2022-1388
JSON object: View
Redhat Information
No data.
CWE