CVE-2023-22374
Vulnerability from cvelistv5
Published
2023-02-01 17:54
Modified
2025-03-26 17:51
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
8.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
8.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS score ?
Summary
A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://my.f5.com/manage/s/article/K000130415 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://my.f5.com/manage/s/article/K000130415 | Vendor Advisory |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T10:07:06.534Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://my.f5.com/manage/s/article/K000130415", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-22374", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-03-26T17:50:54.452809Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-26T17:51:00.789Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", modules: [ "All Modules", ], product: "BIG-IP", vendor: "F5", versions: [ { changes: [ { at: "Engineering Hotfix Available", status: "unaffected", }, ], lessThan: "17.1.0", status: "affected", version: "17.0.0", versionType: "semver", }, { changes: [ { at: "Engineering Hotfix Available", status: "unaffected", }, ], lessThan: "16.1.3.4", status: "affected", version: "16.1.2.2", versionType: "semver", }, { changes: [ { at: "Engineering Hotfix Available", status: "unaffected", }, ], lessThan: "15.1.8.2", status: "affected", version: "15.1.5.1", versionType: "semver", }, { changes: [ { at: "Engineering Hotfix Available", status: "unaffected", }, ], lessThan: "14.1.5.4", status: "affected", version: "14.1.4.6", versionType: "semver", }, { changes: [ { at: "Engineering Hotfix Available", status: "unaffected", }, ], lessThan: "*", status: "affected", version: "13.1.5", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention and following the highest standards of coordinated disclosure.", }, ], datePublic: "2023-02-01T15:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "\n\n<span style=\"background-color: rgb(255, 255, 255);\">A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.</span>\n Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br>\n\n", }, ], value: "\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\n Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "Appliance Mode", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-134", description: "CWE-134 Use of Externally-Controlled Format String", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-04T02:11:45.387Z", orgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", shortName: "f5", }, references: [ { url: "https://my.f5.com/manage/s/article/K000130415", }, ], source: { discovery: "EXTERNAL", }, title: "iControl SOAP vulnerability", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", assignerShortName: "f5", cveId: "CVE-2023-22374", datePublished: "2023-02-01T17:54:46.798Z", dateReserved: "2023-01-13T06:43:37.145Z", dateUpdated: "2025-03-26T17:51:00.789Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2023-22374\",\"sourceIdentifier\":\"f5sirt@f5.com\",\"published\":\"2023-02-01T18:15:11.363\",\"lastModified\":\"2024-11-21T07:44:39.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\\n Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de cadena de formato en iControl SOAP que permite a un atacante autenticado bloquear el proceso CGI de iControl SOAP o, potencialmente, ejecutar código arbitrario. En el modo de dispositivo BIG-IP, una explotación exitosa de esta vulnerabilidad puede permitir al atacante cruzar un límite de seguridad. Nota: Las versiones de software que han llegado al final del soporte técnico (EoTS) no se evalúan.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"f5sirt@f5.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"f5sirt@f5.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-134\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-134\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"BEFCEE4A-EFF7-4622-964D-29706B0D0788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"65BD1840-28C2-42B7-BE75-081DE24081A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"3D511799-6CEE-4337-BF66-38D7AF4D68C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E688B1-28C4-4F9A-9474-381FD22E792D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD637AF5-F7D1-428F-955E-16756B7476E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"32BBAAC4-BCC4-4A84-A579-4356EF78AA22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"AA72ED00-F966-4762-9025-3DB63A1640A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"0279F4AF-C297-47B3-A1DD-C99DF6AAD215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"200AC72D-719D-4663-BE05-C9C7826DEA68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8332960-4AAE-4101-8FFF-2D07B6479BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"4B721D9E-AD2F-44C9-9163-3785AA1A8441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"2685F058-2BEF-4189-BFBC-2F223C776A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"79DD896D-ABC7-485B-8810-39BB65DAF76C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"129F1B0B-44E4-4F67-B0B6-43CD2734F30A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA0A9081-15D2-44F7-B66E-5C594F7C8066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"DC06C851-23E7-4793-9BB0-A1172B78B15F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"1AAE414B-CD2C-4FE1-9124-6F43040DDFB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF66FD8-CDA5-4E44-8A0D-9FF07E8C1E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDEBE106-40F1-439C-8154-187D89988C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"AEFB9B30-9A07-4D28-B3EA-267D257B7E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"764E6777-2C42-46FE-A266-ABBEB05D0F1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"D90494BC-DEBB-47A2-9794-BAC0BF670A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5FDBD38-369B-4007-8D9A-B65B83B2AABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9AB53DF-7335-462E-B8CD-44DF0DCE3826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"C278A7AA-1CA3-432D-9C22-772A288CC178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"785DD62D-CA21-40EC-8AF0-8CC36CCB8304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"AA133203-B4FE-415D-B9C8-7CDE1A7895D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C73DC4-D85A-49A1-81BD-E9D145E42FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"019D49C1-4A4D-40EE-8242-A649BE03E38B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"E943A8AF-F993-4C1C-ADF1-06519694E4C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"C6A12A83-966B-4B6D-AE49-C1696819E548\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4E36FE-C4C7-4C00-A65A-41F50FCE017D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"B46626AD-CF6B-4A1C-8103-0A616C053E5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"4842CD17-44B8-456D-9AC7-A295B4D4DBEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F933F2D2-1C1D-43F0-9BD2-4699716E4A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0954BD-CC9C-448F-A9C1-3FB71AB27D6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"FDC74428-66DF-4A88-A6F5-064160B4C72C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"44E0FC7E-30C1-49D7-9B89-4CB747B28CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"1647DB93-A49C-4A04-B181-3465427D4B17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26873D65-5406-45AF-A7F4-14AF2C55D368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B147BB-1B2E-4F40-9FA7-1165B8F0B60D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"8155903D-1A5F-482E-B356-526E9A973BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"F3938C6C-6855-4873-89EA-4C8B8EFD571C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"0E52120D-FBF7-4687-87A8-BC4AE07DC734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E37750C-50F3-480A-AA40-23D59F50E4B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73FB842B-33B1-4AD4-AC61-47192A87A785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"04FFF651-F115-4591-BA61-E099DE307168\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"FC136CEA-2431-4D53-B898-E245826A9995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"1CD177FA-262E-4874-9850-4E8525181ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F754F6FC-2A29-453F-9E9B-39C779830562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509A4307-3EC4-4AE7-AF72-3C2B3CF9E754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"854D89CF-0E69-4BA9-A881-02673E3D91F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"D03D7294-C5CD-4EC1-8200-A998AED7F8E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"D2DACFE8-5E0B-49EC-894E-175591E9C775\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4686BF-A9FA-4770-BD06-74BA4CA49FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B13312-1958-4B5C-BD4B-2075F6BF8C98\"}]}]}],\"references\":[{\"url\":\"https://my.f5.com/manage/s/article/K000130415\",\"source\":\"f5sirt@f5.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://my.f5.com/manage/s/article/K000130415\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://my.f5.com/manage/s/article/K000130415\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T10:07:06.534Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-22374\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-26T17:50:54.452809Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-26T17:50:57.601Z\"}}], \"cna\": {\"title\": \"iControl SOAP vulnerability\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention and following the highest standards of coordinated disclosure.\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"Appliance Mode\"}]}], \"affected\": [{\"vendor\": \"F5\", \"modules\": [\"All Modules\"], \"product\": \"BIG-IP\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"17.0.0\", \"lessThan\": \"17.1.0\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"16.1.2.2\", \"lessThan\": \"16.1.3.4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"15.1.5.1\", \"lessThan\": \"15.1.8.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"14.1.4.6\", \"lessThan\": \"14.1.5.4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"13.1.5\", \"lessThan\": \"*\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2023-02-01T15:00:00.000Z\", \"references\": [{\"url\": \"https://my.f5.com/manage/s/article/K000130415\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\\n\\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n<span style=\\\"background-color: rgb(255, 255, 255);\\\">A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.</span>\\n Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br>\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-134\", \"description\": \"CWE-134 Use of Externally-Controlled Format String\"}]}], \"providerMetadata\": {\"orgId\": \"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab\", \"shortName\": \"f5\", \"dateUpdated\": \"2023-10-04T02:11:45.387Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2023-22374\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-26T17:51:00.789Z\", \"dateReserved\": \"2023-01-13T06:43:37.145Z\", \"assignerOrgId\": \"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab\", \"datePublished\": \"2023-02-01T17:54:46.798Z\", \"assignerShortName\": \"f5\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.