Buffer Overflow Vulnerability in F5 BIG-IP Advanced WAF
CVE-2021-22992
9.8CRITICAL
Summary
A vulnerability exists in certain versions of F5 BIG-IP products, where a crafted HTTP response to a virtual server could trigger a buffer overflow. This condition may lead to a denial-of-service (DoS) attack and, in specific cases, allow for remote code execution (RCE), potentially compromising the entire system. Users of affected versions should review their deployed instances and consider applying the necessary patches to mitigate risk.
Affected Version(s)
BIG-IP Advanced WAF and BIG-IP ASM 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, 11.6.x before 11.6.5.3
References
EPSS Score
39% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved