MEDIUM · 6.7

CVE-2022-33962

In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, certain iRules commands may allow an attacker to bypass t...

Vulnerability Description

In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, certain iRules commands may allow an attacker to bypass the access control restrictions for a self IP address, regardless of the port lockdown settings. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS Score

6.7

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
F5Big-Ip Access Policy Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Advanced Firewall Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Analytics>= 13.1.0, <= 13.1.5
F5Big-Ip Application Acceleration Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Application Security Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Domain Name System>= 13.1.0, <= 13.1.5
F5Big-Ip Fraud Protection Service>= 13.1.0, <= 13.1.5
F5Big-Ip Global Traffic Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Link Controller>= 13.1.0, <= 13.1.5
F5Big-Ip Local Traffic Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Policy Enforcement Manager>= 13.1.0, <= 13.1.5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-33962?

CVE-2022-33962 is a vulnerability with a CVSS score of 6.7 (MEDIUM). In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, certain iRules commands may allow an attacker to bypass t...

How severe is CVE-2022-33962?

CVE-2022-33962 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-33962?

Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Analytics, F5 Big-Ip Application Acceleration Manager, F5 Big-Ip Application Security Manager.