Vulnerability Description
On BIG-IP 15.1.x before 15.1.3, 14.1.x before 14.1.4.2, 13.1.0.8 through 13.1.3.6, and all versions of 16.0.x, when running in Appliance Mode, an authenticated user assigned the 'Administrator' role may be able to bypass Appliance Mode restrictions utilizing undisclosed iControl REST endpoints. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Big-Ip Access Policy Manager | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Advanced Firewall Manager | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Advanced Web Application Firewall | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Analytics | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Application Acceleration Manager | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Application Security Manager | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Ddos Hybrid Defender | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Domain Name System | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Fraud Protection Service | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Global Traffic Manager | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Link Controller | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Local Traffic Manager | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Policy Enforcement Manager | >= 13.1.0, < 13.1.4 |
| F5 | Big-Ip Ssl Orchestrator | >= 13.1.0, < 13.1.4 |
Related Weaknesses (CWE)
References
- https://support.f5.com/csp/article/K74151369Vendor Advisory
- https://support.f5.com/csp/article/K74151369Vendor Advisory
FAQ
What is CVE-2021-23015?
CVE-2021-23015 is a vulnerability with a CVSS score of 7.2 (HIGH). On BIG-IP 15.1.x before 15.1.3, 14.1.x before 14.1.4.2, 13.1.0.8 through 13.1.3.6, and all versions of 16.0.x, when running in Appliance Mode, an authenticated user assigned the 'Administrator' role m...
How severe is CVE-2021-23015?
CVE-2021-23015 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-23015?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Advanced Web Application Firewall, F5 Big-Ip Analytics, F5 Big-Ip Application Acceleration Manager.