Vulnerabilites related to f5 - r5800
var-202302-0011
Vulnerability from variot

On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0011",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "big-ip domain name system",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lt",
            trust: 1,
            vendor: "f5",
            version: "17.0.0.2",
         },
         {
            model: "big-ip i10600",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "lt",
            trust: 1,
            vendor: "f5",
            version: "15.1.7",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip 10200v",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "17.0.0",
         },
         {
            model: "big-ip 7000s",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip i5600",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "lt",
            trust: 1,
            vendor: "f5",
            version: "17.0.0.2",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip 10200v-ssl",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "r10600",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip i5800",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "viprion b2150",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "r10900",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "r5600",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip i11600",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip i15800",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "velos bx110",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 7200v-ssl",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "r5800",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "17.0.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lt",
            trust: 1,
            vendor: "f5",
            version: "14.1.5.3",
         },
         {
            model: "big-ip 5200v",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip 5000s",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip i15600",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "lt",
            trust: 1,
            vendor: "f5",
            version: "14.1.5.3",
         },
         {
            model: "big-ip i7600",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip i11800",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "viprion b2100",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lt",
            trust: 1,
            vendor: "f5",
            version: "16.1.3.3",
         },
         {
            model: "big-ip 7200v",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip local traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.5",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "15.1.0",
         },
         {
            model: "big-ip i7800",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "r10800",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "viprion b2250",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 10000s",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "lt",
            trust: 1,
            vendor: "f5",
            version: "16.1.3.3",
         },
         {
            model: "viprion b4450",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "r5900",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 12000",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip local traffic manager",
            scope: "lt",
            trust: 1,
            vendor: "f5",
            version: "15.1.7",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip i10800",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "16.1.0",
         },
         {
            model: "big-ip 5200v-ssl",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "viprion b4300",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 10000s",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 5200v-ssl",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 10200v",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 7000s",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 7200v",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 5000s",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip local traffic manager",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 12000",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip 5200v",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            db: "NVD",
            id: "CVE-2023-22839",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.5",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "15.1.7",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "15.1.7",
                        versionStartIncluding: "15.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "17.0.0.2",
                        versionStartIncluding: "17.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "17.0.0.2",
                        versionStartIncluding: "17.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.1.5.3",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.1.5.3",
                        versionStartIncluding: "14.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "16.1.3.3",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "16.1.3.3",
                        versionStartIncluding: "16.1.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2023-22839",
         },
      ],
   },
   cve: "CVE-2023-22839",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 2,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "OTHER",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "JVNDB-2023-003158",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2023-22839",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "f5sirt@f5.com",
                  id: "CVE-2023-22839",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "OTHER",
                  id: "JVNDB-2023-003158",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202302-087",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            db: "NVD",
            id: "CVE-2023-22839",
         },
         {
            db: "NVD",
            id: "CVE-2023-22839",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202302-087",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2023-22839",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            db: "VULHUB",
            id: "VHN-451928",
         },
         {
            db: "VULMON",
            id: "CVE-2023-22839",
         },
      ],
      trust: 1.8,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2023-22839",
            trust: 3.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202302-087",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-451928",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2023-22839",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-451928",
         },
         {
            db: "VULMON",
            id: "CVE-2023-22839",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            db: "NVD",
            id: "CVE-2023-22839",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202302-087",
         },
      ],
   },
   id: "VAR-202302-0011",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-451928",
         },
      ],
      trust: 0.5615448,
   },
   last_update_date: "2023-12-18T12:34:00.669000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "K37708118",
            trust: 0.8,
            url: "https://my.f5.com/manage/s/article/k37708118",
         },
         {
            title: "F5 BIG-IP Fixes for code issue vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=224787",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202302-087",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-476",
            trust: 1.1,
         },
         {
            problemtype: "NULL Pointer dereference (CWE-476) [NVD evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-451928",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            db: "NVD",
            id: "CVE-2023-22839",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "https://my.f5.com/manage/s/article/k37708118",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2023-22839",
         },
         {
            trust: 0.6,
            url: "https://cxsecurity.com/cveshow/cve-2023-22839/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-451928",
         },
         {
            db: "VULMON",
            id: "CVE-2023-22839",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            db: "NVD",
            id: "CVE-2023-22839",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202302-087",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-451928",
         },
         {
            db: "VULMON",
            id: "CVE-2023-22839",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            db: "NVD",
            id: "CVE-2023-22839",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202302-087",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-02-01T00:00:00",
            db: "VULHUB",
            id: "VHN-451928",
         },
         {
            date: "2023-02-01T00:00:00",
            db: "VULMON",
            id: "CVE-2023-22839",
         },
         {
            date: "2023-09-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            date: "2023-02-01T18:15:11.750000",
            db: "NVD",
            id: "CVE-2023-22839",
         },
         {
            date: "2023-02-01T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202302-087",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-02-10T00:00:00",
            db: "VULHUB",
            id: "VHN-451928",
         },
         {
            date: "2023-02-01T00:00:00",
            db: "VULMON",
            id: "CVE-2023-22839",
         },
         {
            date: "2023-09-01T07:36:00",
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
         {
            date: "2023-11-07T04:07:27.390000",
            db: "NVD",
            id: "CVE-2023-22839",
         },
         {
            date: "2023-02-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202302-087",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202302-087",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "BIG-IP  In  NULL  Pointer dereference vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2023-003158",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "code problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202302-087",
         },
      ],
      trust: 0.6,
   },
}

Vulnerability from fkie_nvd
Published
2023-02-01 18:15
Modified
2024-11-21 07:45
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Impacted products
Vendor Product Version
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_10000s_firmware -
f5 big-ip_10000s -
f5 big-ip_10200v_firmware -
f5 big-ip_10200v -
f5 big-ip_10200v-ssl_firmware -
f5 big-ip_10200v-ssl -
f5 big-ip_12000_firmware -
f5 big-ip_12000 -
f5 big-ip_5000s_firmware -
f5 big-ip_5000s -
f5 big-ip_5200v_firmware -
f5 big-ip_5200v -
f5 big-ip_5200v-ssl_firmware -
f5 big-ip_5200v-ssl -
f5 big-ip_7000s_firmware -
f5 big-ip_7000s -
f5 big-ip_7200v_firmware -
f5 big-ip_7200v -
f5 big-ip_7200v-ssl_firmware -
f5 big-ip_7200v-ssl -
f5 big-ip_i10600_firmware -
f5 big-ip_i10600 -
f5 big-ip_i10800_firmware -
f5 big-ip_i10800 -
f5 big-ip_i11600_firmware -
f5 big-ip_i11600 -
f5 big-ip_i11800_firmware -
f5 big-ip_i11800 -
f5 big-ip_i15600_firmware -
f5 big-ip_i15600 -
f5 big-ip_i15800_firmware -
f5 big-ip_i15800 -
f5 big-ip_i5600_firmware -
f5 big-ip_i5600 -
f5 big-ip_i5800_firmware -
f5 big-ip_i5800 -
f5 big-ip_i7600_firmware -
f5 big-ip_i7600 -
f5 big-ip_i7800_firmware -
f5 big-ip_i7800 -
f5 r10600_firmware -
f5 r10600 -
f5 r10800_firmware -
f5 r10800 -
f5 r10900_firmware -
f5 r10900 -
f5 r5600_firmware -
f5 r5600 -
f5 r5800_firmware -
f5 r5800 -
f5 r5900_firmware -
f5 r5900 -
f5 velos_bx110_firmware -
f5 velos_bx110 -
f5 viprion_b2100_firmware -
f5 viprion_b2100 -
f5 viprion_b2150_firmware -
f5 viprion_b2150 -
f5 viprion_b2250_firmware -
f5 viprion_b2250 -
f5 viprion_b4300_firmware -
f5 viprion_b4300 -
f5 viprion_b4450_firmware -
f5 viprion_b4450 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08B25AAB-A98C-4F89-9131-29E3A8C0ED23",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DBB52D1-4FB8-4A71-8F83-02D7DDB99F60",
                     versionEndExcluding: "14.1.5.3",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "313014B4-8033-4B57-B838-66EE163E86D4",
                     versionEndExcluding: "15.1.7",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "203B2B00-7DA5-443D-B4AA-DE0814D7E04D",
                     versionEndExcluding: "16.1.3.3",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93721140-2035-4431-BF5F-CA0C78BBFE53",
                     versionEndExcluding: "17.0.0.2",
                     versionStartIncluding: "17.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0360F76D-E75E-4B05-A294-B47012323ED9",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE9B290B-21D9-40B0-8A6D-36F2C310C71A",
                     versionEndExcluding: "14.1.5.3",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E25D2597-32D7-4676-9A0C-FCAD8D8900A9",
                     versionEndExcluding: "15.1.7",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F11221E1-8354-4854-A75D-060721E9671F",
                     versionEndExcluding: "16.1.3.3",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FAB540A-6082-4F6E-9CDE-0AB719B1001F",
                     versionEndExcluding: "17.0.0.2",
                     versionStartIncluding: "17.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F510CA2D-E049-4884-AB80-EC03560556EF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D59AA4F5-B072-4866-9912-FCBB5F77F8EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "755CF51B-61AD-4C1E-9954-C44EC30E4339",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C37E575D-5674-4BD6-9C24-D318A905FD4E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BE455B9-7497-42EE-A6D2-EFEB0E9B5589",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5E0FBD3-584B-4E20-A664-AFC8B224466C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BF87EE2-1A8A-4050-8168-C4C8A1E49AD7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FA594DF-0441-4761-80AD-C3C64BD1BA59",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EF35744-F9B6-43FD-804D-955EC5AC7360",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EA95257-25F5-483A-BBE5-F906EAF2BCF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E943FF-3EE2-4F87-B005-80432EB4FB67",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD50226B-5D1A-44A0-B530-BBDB50CDC30F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAF21909-A75A-42ED-AAF4-3BC3EE412BA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B405FC13-0B14-4497-8BE8-E09CE5369DE3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B8D26-64B8-46C4-921A-983E0AE82752",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1685A2-60F2-4B06-A68E-FC2E18CF3BEE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F5FE621-B69A-4E93-B5FB-AC7C47A73766",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC83C650-6120-4FD8-85FC-131B7E78F9FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4928A6CA-6FD3-405F-878F-12A199C54C03",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E48A49B-586A-4585-8952-EBF30E8C726C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA9A1D2B-33AA-4691-9891-4360B9B026EC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21BD097C-73F2-4EB7-9024-3DC63EC419D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A81F6A51-9AEF-4502-B19C-449CC9FA7154",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33D524EE-B941-4D73-A83F-02C3253492D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C53B31C-E56F-4FD4-9B51-A741DA8FE479",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EDC8F7B-D052-4DAB-B572-17241E02DC01",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B494DEE-B373-4B3F-95C1-2E0997F32B6E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D400BBB2-399D-41C9-B73B-BDC280B5A51E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BC625D5-C59F-4D20-BA92-0EC85DAB8AFA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B5D6038-EB49-47DE-BC4A-8E9888F217DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4233544A-999C-42CD-9B61-E639AAA460B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43CDBB9F-B6BD-4103-82E8-D66E067704C2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24DA75BA-A4B7-46BD-887D-03CDFAF22791",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "612904C3-0EA5-4F56-BDFE-1A2114C28EEE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52B4EBB6-BEEB-42DA-A146-10E401226BED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF08F72-E905-48C4-9339-0F23EE462CC5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "55433400-8996-44B8-94D7-81690145EF94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8AB5834-CB4C-46AD-A0C6-E3800DE89453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5918B702-39A4-48F5-B381-7FFF0ABE4920",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19F04564-25E9-4962-949D-6C810091464D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE3FCE60-4F2F-48FA-A0AC-89DE82118411",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBFBFFE7-EA68-46E0-A172-FABDD99D7D8D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9940F471-FA88-49FB-B1BD-752366F9A15C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58A0DEB-F0C7-40BD-ACE3-49F0CD5663D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD814768-9507-4C58-9398-6898C3F49272",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "83532FB3-30DE-44B9-A1B7-551F91E61C9F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C0B96E2-7E5D-4C82-B4C5-3F35CD650962",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3DD6188-94B2-43BE-93C8-F2493E2C2C23",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "776A5309-2A92-462B-9CAB-067F5E522386",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n",
      },
   ],
   id: "CVE-2023-22839",
   lastModified: "2024-11-21T07:45:29.820",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "f5sirt@f5.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-02-01T18:15:11.750",
   references: [
      {
         source: "f5sirt@f5.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://my.f5.com/manage/s/article/K37708118",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://my.f5.com/manage/s/article/K37708118",
      },
   ],
   sourceIdentifier: "f5sirt@f5.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "f5sirt@f5.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2023-22839
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:20
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Impacted products
Vendor Product Version
F5 BIG-IP Version: 17.0.0   
Version: 16.1.0   
Version: 15.1.0   
Version: 14.1.0   
Version: 13.1.0   
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:20:31.223Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://my.f5.com/manage/s/article/K37708118",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               modules: [
                  "DNS",
                  "LTM enabled with DNS Services license",
               ],
               product: "BIG-IP",
               vendor: "F5",
               versions: [
                  {
                     lessThan: "17.0.0.2",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "16.1.3.3",
                     status: "affected",
                     version: "16.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "15.1.8.1",
                     status: "affected",
                     version: "15.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "14.1.5.3",
                     status: "affected",
                     version: "14.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "13.1.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-02-01T15:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br>",
                  },
               ],
               value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "CWE-476 NULL Pointer Dereference",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-02-01T17:56:26.064Z",
            orgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
            shortName: "f5",
         },
         references: [
            {
               url: "https://my.f5.com/manage/s/article/K37708118",
            },
         ],
         source: {
            discovery: "INTERNAL",
         },
         title: "BIG-IP DNS profile vulnerability",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
      assignerShortName: "f5",
      cveId: "CVE-2023-22839",
      datePublished: "2023-02-01T17:56:26.064Z",
      dateReserved: "2023-01-13T06:43:46.141Z",
      dateUpdated: "2024-08-02T10:20:31.223Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}