In BIG-IP Versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, an authenticated attacker with Resource Administrator or Manager privileges can create or modify existing monitor objects in the Configuration utility in an undisclosed manner leading to a privilege escalation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K13213418 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: f5
Published: 2022-08-03T00:00:00
Updated: 2022-08-04T17:50:06
Reserved: 2022-07-19T00:00:00
Link: CVE-2022-35735
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-08-04T18:15:10.953
Modified: 2022-08-10T19:26:57.143
Link: CVE-2022-35735
JSON object: View
Redhat Information
No data.
CWE