ID

VAR-202205-0404


CVE

CVE-2022-27181


TITLE

F5 BIG-IP APM  Resource exhaustion vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-010266

DESCRIPTION

On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when APM is configured on a virtual server and the associated access profile is configured with APM AAA NTLM Auth, undisclosed requests can cause an increase in internal resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. F5 BIG-IP APM Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP APM has a resource management error vulnerability that could be exploited by an attacker to cause service degradation, resulting in a denial of service on the BIG-IP system

Trust: 1.8

sources: NVD: CVE-2022-27181 // JVNDB: JVNDB-2022-010266 // VULHUB: VHN-419863 // VULMON: CVE-2022-27181

AFFECTED PRODUCTS

vendor:f5model:big-ip access policy managerscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:14.1.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:14.1.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:13.1.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:14.1.3

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion: -

Trust: 0.8

vendor:f5model:big-ip access policy managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-010266 // NVD: CVE-2022-27181

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-27181
value: MEDIUM

Trust: 1.0

f5sirt@f5.com: CVE-2022-27181
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-27181
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202205-2078
value: MEDIUM

Trust: 0.6

VULHUB: VHN-419863
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-27181
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-27181
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-419863
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-27181
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 2.0

OTHER: JVNDB-2022-010266
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-419863 // VULMON: CVE-2022-27181 // JVNDB: JVNDB-2022-010266 // CNNVD: CNNVD-202205-2078 // NVD: CVE-2022-27181 // NVD: CVE-2022-27181

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.1

problemtype:Resource exhaustion (CWE-400) [ others ]

Trust: 0.8

sources: VULHUB: VHN-419863 // JVNDB: JVNDB-2022-010266 // NVD: CVE-2022-27181

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202205-2078

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202205-2078

PATCH

title:K93543114url:https://my.f5.com/manage/s/article/K93543114

Trust: 0.8

title:F5 BIG-IP APM Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=191830

Trust: 0.6

sources: JVNDB: JVNDB-2022-010266 // CNNVD: CNNVD-202205-2078

EXTERNAL IDS

db:NVDid:CVE-2022-27181

Trust: 3.4

db:JVNDBid:JVNDB-2022-010266

Trust: 0.8

db:AUSCERTid:ESB-2022.2168

Trust: 0.6

db:CNNVDid:CNNVD-202205-2078

Trust: 0.6

db:CNVDid:CNVD-2022-74964

Trust: 0.1

db:VULHUBid:VHN-419863

Trust: 0.1

db:VULMONid:CVE-2022-27181

Trust: 0.1

sources: VULHUB: VHN-419863 // VULMON: CVE-2022-27181 // JVNDB: JVNDB-2022-010266 // CNNVD: CNNVD-202205-2078 // NVD: CVE-2022-27181

REFERENCES

url:https://support.f5.com/csp/article/k93543114

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-27181

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-27181/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2168

Trust: 0.6

url:https://vigilance.fr/vulnerability/f5-big-ip-multiple-vulnerabilities-38241

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-419863 // VULMON: CVE-2022-27181 // JVNDB: JVNDB-2022-010266 // CNNVD: CNNVD-202205-2078 // NVD: CVE-2022-27181

SOURCES

db:VULHUBid:VHN-419863
db:VULMONid:CVE-2022-27181
db:JVNDBid:JVNDB-2022-010266
db:CNNVDid:CNNVD-202205-2078
db:NVDid:CVE-2022-27181

LAST UPDATE DATE

2024-11-23T22:47:23.074000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-419863date:2022-05-13T00:00:00
db:VULMONid:CVE-2022-27181date:2022-05-13T00:00:00
db:JVNDBid:JVNDB-2022-010266date:2023-08-14T06:53:00
db:CNNVDid:CNNVD-202205-2078date:2022-05-16T00:00:00
db:NVDid:CVE-2022-27181date:2024-11-21T06:55:21.537

SOURCES RELEASE DATE

db:VULHUBid:VHN-419863date:2022-05-05T00:00:00
db:VULMONid:CVE-2022-27181date:2022-05-05T00:00:00
db:JVNDBid:JVNDB-2022-010266date:2023-08-14T00:00:00
db:CNNVDid:CNNVD-202205-2078date:2022-05-04T00:00:00
db:NVDid:CVE-2022-27181date:2022-05-05T17:15:12.473