HIGH · 8.7

CVE-2022-35243

In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.5.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role...

Vulnerability Description

In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.5.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, using an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS Score

8.7

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
F5Big-Ip Access Policy Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Advanced Firewall Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Analytics>= 13.1.0, <= 13.1.5
F5Big-Ip Application Acceleration Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Application Security Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Domain Name System>= 13.1.0, <= 13.1.5
F5Big-Ip Fraud Protection Service>= 13.1.0, <= 13.1.5
F5Big-Ip Global Traffic Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Link Controller>= 13.1.0, <= 13.1.5
F5Big-Ip Local Traffic Manager>= 13.1.0, <= 13.1.5
F5Big-Ip Policy Enforcement Manager>= 13.1.0, <= 13.1.5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-35243?

CVE-2022-35243 is a vulnerability with a CVSS score of 8.7 (HIGH). In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.5.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role...

How severe is CVE-2022-35243?

CVE-2022-35243 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-35243?

Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Analytics, F5 Big-Ip Application Acceleration Manager, F5 Big-Ip Application Security Manager.