ID

VAR-202205-0498


CVE

CVE-2022-28706


TITLE

plural  F5 Networks  Product Exceptional State Check Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-010094

DESCRIPTION

On F5 BIG-IP 16.1.x versions prior to 16.1.2 and 15.1.x versions prior to 15.1.5.1, when the DNS resolver configuration is used, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains an exceptional state check vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. F5 BIG-IP has a code issue vulnerability that can be exploited by an attacker to cause a denial of service on the BIG-IP system

Trust: 1.8

sources: NVD: CVE-2022-28706 // JVNDB: JVNDB-2022-010094 // VULHUB: VHN-420243 // VULMON: CVE-2022-28706

AFFECTED PRODUCTS

vendor:f5model:big-ip local traffic managerscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:15.1.3

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:15.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:15.1.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:16.1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.1.2

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:16.1.2

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:15.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope: - version: -

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application acceleration managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application security managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip link controllerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip domain name systemscope: - version: -

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip fraud protection servicescope: - version: -

Trust: 0.8

vendor:f5model:big-ip access policy managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-010094 // NVD: CVE-2022-28706

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-28706
value: HIGH

Trust: 1.0

f5sirt@f5.com: CVE-2022-28706
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-28706
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202205-2073
value: HIGH

Trust: 0.6

VULHUB: VHN-420243
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-28706
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-28706
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-420243
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-28706
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

f5sirt@f5.com: CVE-2022-28706
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-28706
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-420243 // VULMON: CVE-2022-28706 // JVNDB: JVNDB-2022-010094 // CNNVD: CNNVD-202205-2073 // NVD: CVE-2022-28706 // NVD: CVE-2022-28706

PROBLEMTYPE DATA

problemtype:CWE-754

Trust: 1.1

problemtype:Improper checking in exceptional conditions (CWE-754) [ others ]

Trust: 0.8

sources: VULHUB: VHN-420243 // JVNDB: JVNDB-2022-010094 // NVD: CVE-2022-28706

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202205-2073

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202205-2073

PATCH

title:K03755971url:https://support.f5.com/csp/article/K03755971

Trust: 0.8

title:F5 BIG-IP Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=192641

Trust: 0.6

sources: JVNDB: JVNDB-2022-010094 // CNNVD: CNNVD-202205-2073

EXTERNAL IDS

db:NVDid:CVE-2022-28706

Trust: 3.4

db:JVNDBid:JVNDB-2022-010094

Trust: 0.8

db:CS-HELPid:SB2022050510

Trust: 0.6

db:CNNVDid:CNNVD-202205-2073

Trust: 0.6

db:CNVDid:CNVD-2022-79944

Trust: 0.1

db:VULHUBid:VHN-420243

Trust: 0.1

db:VULMONid:CVE-2022-28706

Trust: 0.1

sources: VULHUB: VHN-420243 // VULMON: CVE-2022-28706 // JVNDB: JVNDB-2022-010094 // CNNVD: CNNVD-202205-2073 // NVD: CVE-2022-28706

REFERENCES

url:https://support.f5.com/csp/article/k03755971

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-28706

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2022050510

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-28706/

Trust: 0.6

url:https://vigilance.fr/vulnerability/f5-big-ip-multiple-vulnerabilities-38241

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/754.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-420243 // VULMON: CVE-2022-28706 // JVNDB: JVNDB-2022-010094 // CNNVD: CNNVD-202205-2073 // NVD: CVE-2022-28706

SOURCES

db:VULHUBid:VHN-420243
db:VULMONid:CVE-2022-28706
db:JVNDBid:JVNDB-2022-010094
db:CNNVDid:CNNVD-202205-2073
db:NVDid:CVE-2022-28706

LAST UPDATE DATE

2024-11-23T22:50:48.643000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-420243date:2022-05-12T00:00:00
db:VULMONid:CVE-2022-28706date:2022-05-12T00:00:00
db:JVNDBid:JVNDB-2022-010094date:2023-08-10T07:13:00
db:CNNVDid:CNNVD-202205-2073date:2022-05-13T00:00:00
db:NVDid:CVE-2022-28706date:2024-11-21T06:57:46.513

SOURCES RELEASE DATE

db:VULHUBid:VHN-420243date:2022-05-05T00:00:00
db:VULMONid:CVE-2022-28706date:2022-05-05T00:00:00
db:JVNDBid:JVNDB-2022-010094date:2023-08-10T00:00:00
db:CNNVDid:CNNVD-202205-2073date:2022-05-04T00:00:00
db:NVDid:CVE-2022-28706date:2022-05-05T17:15:14.500