ID

VAR-202208-0291


CVE

CVE-2022-33962


TITLE

BIG-IP  Vulnerability in privilege management in

Trust: 0.8

sources: JVNDB: JVNDB-2022-016733

DESCRIPTION

In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, certain iRules commands may allow an attacker to bypass the access control restrictions for a self IP address, regardless of the port lockdown settings. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP Exists in a permission management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-33962 // JVNDB: JVNDB-2022-016733 // VULHUB: VHN-431021 // VULMON: CVE-2022-33962

AFFECTED PRODUCTS

vendor:f5model:big-ip advanced firewall managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:17.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.1.5.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope: - version: -

Trust: 0.8

vendor:f5model:big-ip link controllerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip analyticsscope: - version: -

Trust: 0.8

vendor:f5model:big-ip access policy managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip fraud protection servicescope: - version: -

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application acceleration managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application security managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-016733 // NVD: CVE-2022-33962

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-33962
value: MEDIUM

Trust: 1.0

f5sirt@f5.com: CVE-2022-33962
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2022-016733
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202208-2068
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-33962
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2022-016733
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-016733 // CNNVD: CNNVD-202208-2068 // NVD: CVE-2022-33962 // NVD: CVE-2022-33962

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.1

problemtype:Improper authority management (CWE-269) [ others ]

Trust: 0.8

sources: VULHUB: VHN-431021 // JVNDB: JVNDB-2022-016733 // NVD: CVE-2022-33962

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202208-2068

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202208-2068

PATCH

title:K80970653url:https://support.f5.com/csp/article/K80970653

Trust: 0.8

sources: JVNDB: JVNDB-2022-016733

EXTERNAL IDS

db:NVDid:CVE-2022-33962

Trust: 3.4

db:JVNDBid:JVNDB-2022-016733

Trust: 0.8

db:CNNVDid:CNNVD-202208-2068

Trust: 0.6

db:VULHUBid:VHN-431021

Trust: 0.1

db:VULMONid:CVE-2022-33962

Trust: 0.1

sources: VULHUB: VHN-431021 // VULMON: CVE-2022-33962 // JVNDB: JVNDB-2022-016733 // CNNVD: CNNVD-202208-2068 // NVD: CVE-2022-33962

REFERENCES

url:https://support.f5.com/csp/article/k80970653

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-33962

Trust: 0.8

url:https://vigilance.fr/vulnerability/f5-big-ip-multiple-vulnerabilities-38983

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-33962/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/269.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-431021 // VULMON: CVE-2022-33962 // JVNDB: JVNDB-2022-016733 // CNNVD: CNNVD-202208-2068 // NVD: CVE-2022-33962

SOURCES

db:VULHUBid:VHN-431021
db:VULMONid:CVE-2022-33962
db:JVNDBid:JVNDB-2022-016733
db:CNNVDid:CNNVD-202208-2068
db:NVDid:CVE-2022-33962

LAST UPDATE DATE

2024-08-14T14:31:02.583000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-431021date:2022-08-10T00:00:00
db:VULMONid:CVE-2022-33962date:2022-08-04T00:00:00
db:JVNDBid:JVNDB-2022-016733date:2023-10-06T04:57:00
db:CNNVDid:CNNVD-202208-2068date:2022-08-11T00:00:00
db:NVDid:CVE-2022-33962date:2022-08-10T23:42:27.107

SOURCES RELEASE DATE

db:VULHUBid:VHN-431021date:2022-08-04T00:00:00
db:VULMONid:CVE-2022-33962date:2022-08-04T00:00:00
db:JVNDBid:JVNDB-2022-016733date:2023-10-06T00:00:00
db:CNNVDid:CNNVD-202208-2068date:2022-08-03T00:00:00
db:NVDid:CVE-2022-33962date:2022-08-04T18:15:09.917