Integrity Check Bypass in F5 BIG-IP Products
CVE-2022-25946
8.7HIGH
Key Information:
- Vendor
- F5
- Vendor
- CVE Published:
- 5 May 2022
Summary
In certain versions of F5 BIG-IP Advanced WAF, ASM, and Guided Configuration, an authenticated attacker with Administrator privileges may exploit a missing integrity check in Appliance mode to bypass critical restrictions. This vulnerability presents a significant concern for organizations relying on these F5 products for secure web application functionality.
Affected Version(s)
BIG-IP (Advanced WAF, APM, ASM) 16.1.x
BIG-IP (Advanced WAF, APM, ASM) 15.1.x
BIG-IP (Advanced WAF, APM, ASM) 14.1.x
References
CVSS V3.1
Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved