ID

VAR-202208-0426


CVE

CVE-2022-34865


TITLE

BIG-IP  Certificate validation vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2022-016719

DESCRIPTION

In BIG-IP Versions 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, Traffic Intelligence feeds, which use HTTPS, do not verify the remote endpoint identity, allowing for potential data poisoning. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP Exists in a certificate validation vulnerability.Information may be obtained and information may be tampered with

Trust: 1.8

sources: NVD: CVE-2022-34865 // JVNDB: JVNDB-2022-016719 // VULHUB: VHN-431289 // VULMON: CVE-2022-34865

AFFECTED PRODUCTS

vendor:f5model:big-ip fraud protection servicescope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip domain name systemscope: - version: -

Trust: 0.8

vendor:f5model:big-ip link controllerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip analyticsscope: - version: -

Trust: 0.8

vendor:f5model:big-ip access policy managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip fraud protection servicescope: - version: -

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application acceleration managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application security managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-016719 // NVD: CVE-2022-34865

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34865
value: CRITICAL

Trust: 1.0

f5sirt@f5.com: CVE-2022-34865
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-34865
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202208-2065
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2022-34865
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

f5sirt@f5.com: CVE-2022-34865
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 2.5
version: 3.1

Trust: 1.0

NVD: CVE-2022-34865
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-016719 // CNNVD: CNNVD-202208-2065 // NVD: CVE-2022-34865 // NVD: CVE-2022-34865

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.1

problemtype:Illegal certificate verification (CWE-295) [ others ]

Trust: 0.8

sources: VULHUB: VHN-431289 // JVNDB: JVNDB-2022-016719 // NVD: CVE-2022-34865

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202208-2065

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-202208-2065

PATCH

title:K25046752url:https://my.f5.com/manage/s/article/K25046752

Trust: 0.8

sources: JVNDB: JVNDB-2022-016719

EXTERNAL IDS

db:NVDid:CVE-2022-34865

Trust: 3.4

db:JVNDBid:JVNDB-2022-016719

Trust: 0.8

db:CNNVDid:CNNVD-202208-2065

Trust: 0.6

db:VULHUBid:VHN-431289

Trust: 0.1

db:VULMONid:CVE-2022-34865

Trust: 0.1

sources: VULHUB: VHN-431289 // VULMON: CVE-2022-34865 // JVNDB: JVNDB-2022-016719 // CNNVD: CNNVD-202208-2065 // NVD: CVE-2022-34865

REFERENCES

url:https://support.f5.com/csp/article/k25046752

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-34865

Trust: 0.8

url:https://vigilance.fr/vulnerability/f5-big-ip-multiple-vulnerabilities-38983

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-34865/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/295.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-431289 // VULMON: CVE-2022-34865 // JVNDB: JVNDB-2022-016719 // CNNVD: CNNVD-202208-2065 // NVD: CVE-2022-34865

SOURCES

db:VULHUBid:VHN-431289
db:VULMONid:CVE-2022-34865
db:JVNDBid:JVNDB-2022-016719
db:CNNVDid:CNNVD-202208-2065
db:NVDid:CVE-2022-34865

LAST UPDATE DATE

2024-08-14T14:43:49.193000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-431289date:2022-08-10T00:00:00
db:VULMONid:CVE-2022-34865date:2022-08-04T00:00:00
db:JVNDBid:JVNDB-2022-016719date:2023-10-06T02:55:00
db:CNNVDid:CNNVD-202208-2065date:2022-08-11T00:00:00
db:NVDid:CVE-2022-34865date:2022-08-10T18:31:38.010

SOURCES RELEASE DATE

db:VULHUBid:VHN-431289date:2022-08-04T00:00:00
db:VULMONid:CVE-2022-34865date:2022-08-04T00:00:00
db:JVNDBid:JVNDB-2022-016719date:2023-10-06T00:00:00
db:CNNVDid:CNNVD-202208-2065date:2022-08-03T00:00:00
db:NVDid:CVE-2022-34865date:2022-08-04T18:15:10.377