Integrity Check Bypass in F5 BIG-IP Products
CVE-2022-25946

8.7HIGH

Key Information:

Summary

In certain versions of F5 BIG-IP Advanced WAF, ASM, and Guided Configuration, an authenticated attacker with Administrator privileges may exploit a missing integrity check in Appliance mode to bypass critical restrictions. This vulnerability presents a significant concern for organizations relying on these F5 products for secure web application functionality.

Affected Version(s)

BIG-IP (Advanced WAF, APM, ASM) 16.1.x

BIG-IP (Advanced WAF, APM, ASM) 15.1.x

BIG-IP (Advanced WAF, APM, ASM) 14.1.x

References

CVSS V3.1

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.