CERTFR-2022-AVI-419
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits F5. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

  • F5 BIG-IP (tous modules) versions 17.x antérieures à 17.0.0
  • F5 BIG-IP (tous modules) versions 16.x antérieures à 16.1.2.2
  • F5 BIG-IP (tous modules) versions 15.x antérieures à 15.1.5.1
  • F5 BIG-IP (tous modules) versions antérieures à 14.1.4.6
  • NGINX App Protect versions antérieures à 3.7.0

Concernant la vulnérabilité critique, immatriculée CVE-2022-1388, l'éditeur propose un correctif de sécurité pour les produits F5 BIG-IP en versions 13.x. Cependant il est très fortement recommandé pour toutes les versions 11.x, 12.x et 13.x de migrer au moins vers la version 14.1.4.6 afin de pouvoir bénéficier de l'intégralité des correctifs de sécurité.

Impacted products
Vendor Product Description
References
Bulletin de sécurité F5 K54082580 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K41440465 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K21317311 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K31856317 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K14229426 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K23454411 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K71103363 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K06323049 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K49905324 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K39002226 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K93543114 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K25451853 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K24248011 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K54460845 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K51539421 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K92306170 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K37155600 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K64124988 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K17341495 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K38271531 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K41877405 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K80945213 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K08510472 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K03442392 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K85054496 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K68816502 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K23605346 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K59904248 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K68647001 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K74302282 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K85021277 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K47662005 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K94093538 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K57110035 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K57555833 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K92807525 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K53197140 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K81952114 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K53593534 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K52322100 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K03755971 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K70134152 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K33552735 du 04 mai 2022 None vendor-advisory
Bulletin de sécurité F5 K67397230 du 04 mai 2022 None vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cul\u003e \u003cli\u003eF5 BIG-IP (tous modules) versions 17.x ant\u00e9rieures \u00e0 17.0.0\u003c/li\u003e \u003cli\u003eF5 BIG-IP (tous modules) versions 16.x ant\u00e9rieures \u00e0 16.1.2.2\u003c/li\u003e \u003cli\u003eF5 BIG-IP (tous modules) versions 15.x ant\u00e9rieures \u00e0 15.1.5.1\u003c/li\u003e \u003cli\u003eF5 BIG-IP (tous modules) versions ant\u00e9rieures \u00e0 14.1.4.6\u003c/li\u003e \u003cli\u003eNGINX App Protect versions ant\u00e9rieures \u00e0 3.7.0\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eConcernant la vuln\u00e9rabilit\u00e9 critique, immatricul\u00e9e CVE-2022-1388, l\u0027\u00e9diteur propose un correctif de s\u00e9curit\u00e9 pour les produits F5 BIG-IP en versions 13.x. Cependant il est tr\u00e8s fortement recommand\u00e9 pour toutes les versions 11.x, 12.x et 13.x de migrer au moins vers la version 14.1.4.6 afin de pouvoir b\u00e9n\u00e9ficier de l\u0027int\u00e9gralit\u00e9 des correctifs de s\u00e9curit\u00e9.\u003c/p\u003e ",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-25946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25946"
    },
    {
      "name": "CVE-2022-28695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28695"
    },
    {
      "name": "CVE-2022-27662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27662"
    },
    {
      "name": "CVE-2022-26415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26415"
    },
    {
      "name": "CVE-2022-26890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26890"
    },
    {
      "name": "CVE-2022-29480",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29480"
    },
    {
      "name": "CVE-2022-27636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27636"
    },
    {
      "name": "CVE-2022-27230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27230"
    },
    {
      "name": "CVE-2022-29474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29474"
    },
    {
      "name": "CVE-2022-27495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27495"
    },
    {
      "name": "CVE-2022-27634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27634"
    },
    {
      "name": "CVE-2022-1389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1389"
    },
    {
      "name": "CVE-2022-26340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26340"
    },
    {
      "name": "CVE-2022-26370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26370"
    },
    {
      "name": "CVE-2022-26517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26517"
    },
    {
      "name": "CVE-2022-28708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28708"
    },
    {
      "name": "CVE-2022-28706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28706"
    },
    {
      "name": "CVE-2022-29263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29263"
    },
    {
      "name": "CVE-2022-29473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29473"
    },
    {
      "name": "CVE-2022-28714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28714"
    },
    {
      "name": "CVE-2022-29491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29491"
    },
    {
      "name": "CVE-2022-27806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27806"
    },
    {
      "name": "CVE-2022-28716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28716"
    },
    {
      "name": "CVE-2022-27181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27181"
    },
    {
      "name": "CVE-2022-28859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28859"
    },
    {
      "name": "CVE-2022-26835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26835"
    },
    {
      "name": "CVE-2022-28691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28691"
    },
    {
      "name": "CVE-2022-29479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29479"
    },
    {
      "name": "CVE-2022-27880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27880"
    },
    {
      "name": "CVE-2022-1388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1388"
    },
    {
      "name": "CVE-2022-27182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27182"
    },
    {
      "name": "CVE-2022-26071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26071"
    },
    {
      "name": "CVE-2022-27659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27659"
    }
  ],
  "initial_release_date": "2022-05-05T00:00:00",
  "last_revision_date": "2022-05-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-419",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-05-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits F5.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F5",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K54082580 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K54082580"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K41440465 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K41440465"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K21317311 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K21317311"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K31856317 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K31856317"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K14229426 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K14229426"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K23454411 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K23454411"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K71103363 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K71103363"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K06323049 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K06323049"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K49905324 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K49905324"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K39002226 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K39002226"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K93543114 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K93543114"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K25451853 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K25451853"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K24248011 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K24248011"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K54460845 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K54460845"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K51539421 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K51539421"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K92306170 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K92306170"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K37155600 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K37155600"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K64124988 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K64124988"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K17341495 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K17341495"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K38271531 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K38271531"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K41877405 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K41877405"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K80945213 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K80945213"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K08510472 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K08510472"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K03442392 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K03442392"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K85054496 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K85054496"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K68816502 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K68816502"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K23605346 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K23605346"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K59904248 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K59904248"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K68647001 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K68647001"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K74302282 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K74302282"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K85021277 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K85021277"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K47662005 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K47662005"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K94093538 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K94093538"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K57110035 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K57110035"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K57555833 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K57555833"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K92807525 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K92807525"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K53197140 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K53197140"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K81952114 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K81952114"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K53593534 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K53593534"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K52322100 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K52322100"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K03755971 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K03755971"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K70134152 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K70134152"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K33552735 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K33552735"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K67397230 du 04 mai 2022",
      "url": "https://support.f5.com/csp/article/K67397230"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…