HIGH · 7.0

CVE-2023-22657

On F5OS-A beginning in version 1.2.0 to before 1.3.0 and F5OS-C beginning in version 1.3.0 to before 1.5.0, processing F5OS tenant file names may allow for command injection. Note: Software versions ...

Vulnerability Description

On F5OS-A beginning in version 1.2.0 to before 1.3.0 and F5OS-C beginning in version 1.3.0 to before 1.5.0, processing F5OS tenant file names may allow for command injection. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS Score

7.0

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
F5F5Os-A>= 1.2.0, < 1.3.0
F5F5Os-C>= 1.3.0, < 1.5.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-22657?

CVE-2023-22657 is a vulnerability with a CVSS score of 7.0 (HIGH). On F5OS-A beginning in version 1.2.0 to before 1.3.0 and F5OS-C beginning in version 1.3.0 to before 1.5.0, processing F5OS tenant file names may allow for command injection. Note: Software versions ...

How severe is CVE-2023-22657?

CVE-2023-22657 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-22657?

Check the references section above for vendor advisories and patch information. Affected products include: F5 F5Os-A, F5 F5Os-C.