ID

VAR-202210-1428


CVE

CVE-2022-41813


TITLE

F5 BIG-IP Input validation error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202210-1425

DESCRIPTION

In versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when BIG-IP is provisioned with PEM or AFM module, an undisclosed input can cause Traffic Management Microkernel (TMM) to terminate. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. The following versions are affected: 16.1.x versions prior to 16.1.3.1, 15.1.x versions prior to 15.1.6.1, 14.1.x versions prior to 14.1.5, all versions prior to 13.1.x

Trust: 0.99

sources: NVD: CVE-2022-41813 // VULHUB: VHN-429561

AFFECTED PRODUCTS

vendor:f5model:big-ip policy enforcement managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:15.1.6.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:16.1.3.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.1.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:16.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.1.0

Trust: 1.0

sources: NVD: CVE-2022-41813

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-41813
value: MEDIUM

Trust: 1.0

f5sirt@f5.com: CVE-2022-41813
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202210-1425
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-41813
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: CNNVD: CNNVD-202210-1425 // NVD: CVE-2022-41813 // NVD: CVE-2022-41813

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-429561 // NVD: CVE-2022-41813

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-1425

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202210-1425

PATCH

title:F5 BIG-IP Enter the fix for the verification error vulnerabilityurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=211818

Trust: 0.6

sources: CNNVD: CNNVD-202210-1425

EXTERNAL IDS

db:NVDid:CVE-2022-41813

Trust: 1.7

db:CNNVDid:CNNVD-202210-1425

Trust: 0.7

db:VULHUBid:VHN-429561

Trust: 0.1

sources: VULHUB: VHN-429561 // CNNVD: CNNVD-202210-1425 // NVD: CVE-2022-41813

REFERENCES

url:https://support.f5.com/csp/article/k93723284

Trust: 1.7

url:https://cxsecurity.com/cveshow/cve-2022-41813/

Trust: 0.6

url:https://vigilance.fr/vulnerability/f5-big-ip-denial-of-service-via-traffic-management-microkernel-39639

Trust: 0.6

sources: VULHUB: VHN-429561 // CNNVD: CNNVD-202210-1425 // NVD: CVE-2022-41813

SOURCES

db:VULHUBid:VHN-429561
db:CNNVDid:CNNVD-202210-1425
db:NVDid:CVE-2022-41813

LAST UPDATE DATE

2024-08-14T14:37:12.369000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-429561date:2022-10-24T00:00:00
db:CNNVDid:CNNVD-202210-1425date:2022-10-25T00:00:00
db:NVDid:CVE-2022-41813date:2022-10-24T14:06:35.050

SOURCES RELEASE DATE

db:VULHUBid:VHN-429561date:2022-10-19T00:00:00
db:CNNVDid:CNNVD-202210-1425date:2022-10-19T00:00:00
db:NVDid:CVE-2022-41813date:2022-10-19T22:15:13.270