Vulnerabilites related to f5 - r5800
var-202302-0011
Vulnerability from variot
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0011", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "big-ip domain name system", scope: "lte", trust: 1, vendor: "f5", version: "13.1.5", }, { model: "big-ip local traffic manager", scope: "lt", trust: 1, vendor: "f5", version: "17.0.0.2", }, { model: "big-ip i10600", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip domain name system", scope: "lt", trust: 1, vendor: "f5", version: "15.1.7", }, { model: "big-ip local traffic manager", scope: "gte", trust: 1, vendor: "f5", version: "14.1.0", }, { model: "big-ip 10200v", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip local traffic manager", scope: "gte", trust: 1, vendor: "f5", version: "17.0.0", }, { model: "big-ip 7000s", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip i5600", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip domain name system", scope: "lt", trust: 1, vendor: "f5", version: "17.0.0.2", }, { model: "big-ip domain name system", scope: "gte", trust: 1, vendor: "f5", version: "13.1.0", }, { model: "big-ip 10200v-ssl", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "r10600", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip i5800", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "viprion b2150", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "r10900", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "r5600", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip i11600", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip i15800", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "velos bx110", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip 7200v-ssl", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "r5800", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip domain name system", scope: "gte", trust: 1, vendor: "f5", version: "17.0.0", }, { model: "big-ip local traffic manager", scope: "lt", trust: 1, vendor: "f5", version: "14.1.5.3", }, { model: "big-ip 5200v", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip domain name system", scope: "gte", trust: 1, vendor: "f5", version: "14.1.0", }, { model: "big-ip local traffic manager", scope: "gte", trust: 1, vendor: "f5", version: "15.1.0", }, { model: "big-ip 5000s", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip i15600", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip domain name system", scope: "lt", trust: 1, vendor: "f5", version: "14.1.5.3", }, { model: "big-ip i7600", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip i11800", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "viprion b2100", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip local traffic manager", scope: "gte", trust: 1, vendor: "f5", version: "16.1.0", }, { model: "big-ip local traffic manager", scope: "lt", trust: 1, vendor: "f5", version: "16.1.3.3", }, { model: "big-ip 7200v", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip local traffic manager", scope: "lte", trust: 1, vendor: "f5", version: "13.1.5", }, { model: "big-ip domain name system", scope: "gte", trust: 1, vendor: "f5", version: "15.1.0", }, { model: "big-ip i7800", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "r10800", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "viprion b2250", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip 10000s", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip domain name system", scope: "lt", trust: 1, vendor: "f5", version: "16.1.3.3", }, { model: "viprion b4450", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "r5900", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip 12000", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip local traffic manager", scope: "lt", trust: 1, vendor: "f5", version: "15.1.7", }, { model: "big-ip local traffic manager", scope: "gte", trust: 1, vendor: "f5", version: "13.1.0", }, { model: "big-ip i10800", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip domain name system", scope: "gte", trust: 1, vendor: "f5", version: "16.1.0", }, { model: "big-ip 5200v-ssl", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "viprion b4300", scope: "eq", trust: 1, vendor: "f5", version: null, }, { model: "big-ip 10000s", scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: "big-ip 5200v-ssl", scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: "big-ip domain name system", scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: "big-ip 10200v", scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: "big-ip 7000s", scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: "big-ip 7200v", scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: "big-ip 5000s", scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: "big-ip local traffic manager", scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: "big-ip 12000", scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: "big-ip 5200v", scope: null, trust: 0.8, vendor: "f5", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-003158", }, { db: "NVD", id: "CVE-2023-22839", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "13.1.5", versionStartIncluding: "13.1.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "13.1.5", versionStartIncluding: "13.1.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "15.1.7", versionStartIncluding: "15.1.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "15.1.7", versionStartIncluding: "15.1.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "17.0.0.2", versionStartIncluding: "17.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "17.0.0.2", versionStartIncluding: "17.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "14.1.5.3", versionStartIncluding: "14.1.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "14.1.5.3", versionStartIncluding: "14.1.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "16.1.3.3", versionStartIncluding: "16.1.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "16.1.3.3", versionStartIncluding: "16.1.0", vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-22839", }, ], }, cve: "CVE-2023-22839", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 2, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "OTHER", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2023-003158", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2023-22839", trust: 1, value: "HIGH", }, { author: "f5sirt@f5.com", id: "CVE-2023-22839", trust: 1, value: "HIGH", }, { author: "OTHER", id: "JVNDB-2023-003158", trust: 0.8, value: "High", }, { author: "CNNVD", id: "CNNVD-202302-087", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-003158", }, { db: "NVD", id: "CVE-2023-22839", }, { db: "NVD", id: "CVE-2023-22839", }, { db: "CNNVD", id: "CNNVD-202302-087", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state", sources: [ { db: "NVD", id: "CVE-2023-22839", }, { db: "JVNDB", id: "JVNDB-2023-003158", }, { db: "VULHUB", id: "VHN-451928", }, { db: "VULMON", id: "CVE-2023-22839", }, ], trust: 1.8, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2023-22839", trust: 3.4, }, { db: "JVNDB", id: "JVNDB-2023-003158", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202302-087", trust: 0.6, }, { db: "VULHUB", id: "VHN-451928", trust: 0.1, }, { db: "VULMON", id: "CVE-2023-22839", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-451928", }, { db: "VULMON", id: "CVE-2023-22839", }, { db: "JVNDB", id: "JVNDB-2023-003158", }, { db: "NVD", id: "CVE-2023-22839", }, { db: "CNNVD", id: "CNNVD-202302-087", }, ], }, id: "VAR-202302-0011", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-451928", }, ], trust: 0.5615448, }, last_update_date: "2023-12-18T12:34:00.669000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "K37708118", trust: 0.8, url: "https://my.f5.com/manage/s/article/k37708118", }, { title: "F5 BIG-IP Fixes for code issue vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=224787", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-003158", }, { db: "CNNVD", id: "CNNVD-202302-087", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-476", trust: 1.1, }, { problemtype: "NULL Pointer dereference (CWE-476) [NVD evaluation ]", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-451928", }, { db: "JVNDB", id: "JVNDB-2023-003158", }, { db: "NVD", id: "CVE-2023-22839", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://my.f5.com/manage/s/article/k37708118", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2023-22839", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2023-22839/", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULHUB", id: "VHN-451928", }, { db: "VULMON", id: "CVE-2023-22839", }, { db: "JVNDB", id: "JVNDB-2023-003158", }, { db: "NVD", id: "CVE-2023-22839", }, { db: "CNNVD", id: "CNNVD-202302-087", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-451928", }, { db: "VULMON", id: "CVE-2023-22839", }, { db: "JVNDB", id: "JVNDB-2023-003158", }, { db: "NVD", id: "CVE-2023-22839", }, { db: "CNNVD", id: "CNNVD-202302-087", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-02-01T00:00:00", db: "VULHUB", id: "VHN-451928", }, { date: "2023-02-01T00:00:00", db: "VULMON", id: "CVE-2023-22839", }, { date: "2023-09-01T00:00:00", db: "JVNDB", id: "JVNDB-2023-003158", }, { date: "2023-02-01T18:15:11.750000", db: "NVD", id: "CVE-2023-22839", }, { date: "2023-02-01T00:00:00", db: "CNNVD", id: "CNNVD-202302-087", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-02-10T00:00:00", db: "VULHUB", id: "VHN-451928", }, { date: "2023-02-01T00:00:00", db: "VULMON", id: "CVE-2023-22839", }, { date: "2023-09-01T07:36:00", db: "JVNDB", id: "JVNDB-2023-003158", }, { date: "2023-11-07T04:07:27.390000", db: "NVD", id: "CVE-2023-22839", }, { date: "2023-02-13T00:00:00", db: "CNNVD", id: "CNNVD-202302-087", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202302-087", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "BIG-IP In NULL Pointer dereference vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2023-003158", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "code problem", sources: [ { db: "CNNVD", id: "CNNVD-202302-087", }, ], trust: 0.6, }, }
Vulnerability from fkie_nvd
Published
2023-02-01 18:15
Modified
2024-11-21 07:45
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://my.f5.com/manage/s/article/K37708118 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://my.f5.com/manage/s/article/K37708118 | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "08B25AAB-A98C-4F89-9131-29E3A8C0ED23", versionEndIncluding: "13.1.5", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "7DBB52D1-4FB8-4A71-8F83-02D7DDB99F60", versionEndExcluding: "14.1.5.3", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "313014B4-8033-4B57-B838-66EE163E86D4", versionEndExcluding: "15.1.7", versionStartIncluding: "15.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "203B2B00-7DA5-443D-B4AA-DE0814D7E04D", versionEndExcluding: "16.1.3.3", versionStartIncluding: "16.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "93721140-2035-4431-BF5F-CA0C78BBFE53", versionEndExcluding: "17.0.0.2", versionStartIncluding: "17.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "0360F76D-E75E-4B05-A294-B47012323ED9", versionEndIncluding: "13.1.5", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "EE9B290B-21D9-40B0-8A6D-36F2C310C71A", versionEndExcluding: "14.1.5.3", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E25D2597-32D7-4676-9A0C-FCAD8D8900A9", versionEndExcluding: "15.1.7", versionStartIncluding: "15.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "F11221E1-8354-4854-A75D-060721E9671F", versionEndExcluding: "16.1.3.3", versionStartIncluding: "16.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "5FAB540A-6082-4F6E-9CDE-0AB719B1001F", versionEndExcluding: "17.0.0.2", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F510CA2D-E049-4884-AB80-EC03560556EF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*", matchCriteriaId: "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D59AA4F5-B072-4866-9912-FCBB5F77F8EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*", matchCriteriaId: "755CF51B-61AD-4C1E-9954-C44EC30E4339", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C37E575D-5674-4BD6-9C24-D318A905FD4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*", matchCriteriaId: "1BE455B9-7497-42EE-A6D2-EFEB0E9B5589", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5E0FBD3-584B-4E20-A664-AFC8B224466C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*", matchCriteriaId: "3BF87EE2-1A8A-4050-8168-C4C8A1E49AD7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1FA594DF-0441-4761-80AD-C3C64BD1BA59", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*", matchCriteriaId: "1EF35744-F9B6-43FD-804D-955EC5AC7360", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA95257-25F5-483A-BBE5-F906EAF2BCF9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*", matchCriteriaId: "86E943FF-3EE2-4F87-B005-80432EB4FB67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD50226B-5D1A-44A0-B530-BBDB50CDC30F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*", matchCriteriaId: "BAF21909-A75A-42ED-AAF4-3BC3EE412BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B405FC13-0B14-4497-8BE8-E09CE5369DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*", matchCriteriaId: "046B8D26-64B8-46C4-921A-983E0AE82752", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B1685A2-60F2-4B06-A68E-FC2E18CF3BEE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*", matchCriteriaId: "6F5FE621-B69A-4E93-B5FB-AC7C47A73766", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC83C650-6120-4FD8-85FC-131B7E78F9FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*", matchCriteriaId: "4928A6CA-6FD3-405F-878F-12A199C54C03", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E48A49B-586A-4585-8952-EBF30E8C726C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9A1D2B-33AA-4691-9891-4360B9B026EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "21BD097C-73F2-4EB7-9024-3DC63EC419D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A81F6A51-9AEF-4502-B19C-449CC9FA7154", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33D524EE-B941-4D73-A83F-02C3253492D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C53B31C-E56F-4FD4-9B51-A741DA8FE479", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5EDC8F7B-D052-4DAB-B572-17241E02DC01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*", matchCriteriaId: "4B494DEE-B373-4B3F-95C1-2E0997F32B6E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D400BBB2-399D-41C9-B73B-BDC280B5A51E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*", matchCriteriaId: "5BC625D5-C59F-4D20-BA92-0EC85DAB8AFA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8B5D6038-EB49-47DE-BC4A-8E9888F217DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*", matchCriteriaId: "4233544A-999C-42CD-9B61-E639AAA460B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "43CDBB9F-B6BD-4103-82E8-D66E067704C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*", matchCriteriaId: "24DA75BA-A4B7-46BD-887D-03CDFAF22791", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "612904C3-0EA5-4F56-BDFE-1A2114C28EEE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*", matchCriteriaId: "52B4EBB6-BEEB-42DA-A146-10E401226BED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AF08F72-E905-48C4-9339-0F23EE462CC5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*", matchCriteriaId: "55433400-8996-44B8-94D7-81690145EF94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E8AB5834-CB4C-46AD-A0C6-E3800DE89453", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*", matchCriteriaId: "5918B702-39A4-48F5-B381-7FFF0ABE4920", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19F04564-25E9-4962-949D-6C810091464D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*", matchCriteriaId: "CE3FCE60-4F2F-48FA-A0AC-89DE82118411", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BBFBFFE7-EA68-46E0-A172-FABDD99D7D8D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*", matchCriteriaId: "9940F471-FA88-49FB-B1BD-752366F9A15C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B58A0DEB-F0C7-40BD-ACE3-49F0CD5663D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*", matchCriteriaId: "AD814768-9507-4C58-9398-6898C3F49272", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "83532FB3-30DE-44B9-A1B7-551F91E61C9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*", matchCriteriaId: "3C0B96E2-7E5D-4C82-B4C5-3F35CD650962", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C3DD6188-94B2-43BE-93C8-F2493E2C2C23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*", matchCriteriaId: "776A5309-2A92-462B-9CAB-067F5E522386", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n", }, ], id: "CVE-2023-22839", lastModified: "2024-11-21T07:45:29.820", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "f5sirt@f5.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-02-01T18:15:11.750", references: [ { source: "f5sirt@f5.com", tags: [ "Vendor Advisory", ], url: "https://my.f5.com/manage/s/article/K37708118", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://my.f5.com/manage/s/article/K37708118", }, ], sourceIdentifier: "f5sirt@f5.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "f5sirt@f5.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2023-22839
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T10:20:31.223Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://my.f5.com/manage/s/article/K37708118", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", modules: [ "DNS", "LTM enabled with DNS Services license", ], product: "BIG-IP", vendor: "F5", versions: [ { lessThan: "17.0.0.2", status: "affected", version: "17.0.0", versionType: "semver", }, { lessThan: "16.1.3.3", status: "affected", version: "16.1.0", versionType: "semver", }, { lessThan: "15.1.8.1", status: "affected", version: "15.1.0", versionType: "semver", }, { lessThan: "14.1.5.3", status: "affected", version: "14.1.0", versionType: "semver", }, { lessThan: "*", status: "affected", version: "13.1.0", versionType: "semver", }, ], }, ], datePublic: "2023-02-01T15:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br>", }, ], value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-01T17:56:26.064Z", orgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", shortName: "f5", }, references: [ { url: "https://my.f5.com/manage/s/article/K37708118", }, ], source: { discovery: "INTERNAL", }, title: "BIG-IP DNS profile vulnerability", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", assignerShortName: "f5", cveId: "CVE-2023-22839", datePublished: "2023-02-01T17:56:26.064Z", dateReserved: "2023-01-13T06:43:46.141Z", dateUpdated: "2024-08-02T10:20:31.223Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }