CVE-2023-22374 (GCVE-0-2023-22374)

Vulnerability from cvelistv5 – Published: 2023-02-01 17:54 – Updated: 2025-03-26 17:51
VLAI?
Summary
A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE
  • CWE-134 - Use of Externally-Controlled Format String
Assigner
f5
Impacted products
Vendor Product Version
F5 BIG-IP Affected: 17.0.0 , < 17.1.0 (semver)
Affected: 16.1.2.2 , < 16.1.3.4 (semver)
Affected: 15.1.5.1 , < 15.1.8.2 (semver)
Affected: 14.1.4.6 , < 14.1.5.4 (semver)
Affected: 13.1.5 , < * (semver)
Create a notification for this product.
Credits
F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention and following the highest standards of coordinated disclosure.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:07:06.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://my.f5.com/manage/s/article/K000130415"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-22374",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-26T17:50:54.452809Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-26T17:51:00.789Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "modules": [
            "All Modules"
          ],
          "product": "BIG-IP",
          "vendor": "F5",
          "versions": [
            {
              "changes": [
                {
                  "at": "Engineering Hotfix Available",
                  "status": "unaffected"
                }
              ],
              "lessThan": "17.1.0",
              "status": "affected",
              "version": "17.0.0",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "Engineering Hotfix Available",
                  "status": "unaffected"
                }
              ],
              "lessThan": "16.1.3.4",
              "status": "affected",
              "version": "16.1.2.2",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "Engineering Hotfix Available",
                  "status": "unaffected"
                }
              ],
              "lessThan": "15.1.8.2",
              "status": "affected",
              "version": "15.1.5.1",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "Engineering Hotfix Available",
                  "status": "unaffected"
                }
              ],
              "lessThan": "14.1.5.4",
              "status": "affected",
              "version": "14.1.4.6",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "Engineering Hotfix Available",
                  "status": "unaffected"
                }
              ],
              "lessThan": "*",
              "status": "affected",
              "version": "13.1.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention and following the highest standards of coordinated disclosure."
        }
      ],
      "datePublic": "2023-02-01T15:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\u003c/span\u003e\n\u0026nbsp;Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e\n\n"
            }
          ],
          "value": "\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\n\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "Appliance Mode"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-134",
              "description": "CWE-134 Use of Externally-Controlled Format String",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-04T02:11:45.387Z",
        "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
        "shortName": "f5"
      },
      "references": [
        {
          "url": "https://my.f5.com/manage/s/article/K000130415"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "iControl SOAP vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
    "assignerShortName": "f5",
    "cveId": "CVE-2023-22374",
    "datePublished": "2023-02-01T17:54:46.798Z",
    "dateReserved": "2023-01-13T06:43:37.145Z",
    "dateUpdated": "2025-03-26T17:51:00.789Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"BEFCEE4A-EFF7-4622-964D-29706B0D0788\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"65BD1840-28C2-42B7-BE75-081DE24081A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"3D511799-6CEE-4337-BF66-38D7AF4D68C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3E688B1-28C4-4F9A-9474-381FD22E792D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD637AF5-F7D1-428F-955E-16756B7476E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"32BBAAC4-BCC4-4A84-A579-4356EF78AA22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"AA72ED00-F966-4762-9025-3DB63A1640A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"0279F4AF-C297-47B3-A1DD-C99DF6AAD215\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"200AC72D-719D-4663-BE05-C9C7826DEA68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8332960-4AAE-4101-8FFF-2D07B6479BD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"4B721D9E-AD2F-44C9-9163-3785AA1A8441\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"2685F058-2BEF-4189-BFBC-2F223C776A63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"79DD896D-ABC7-485B-8810-39BB65DAF76C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"129F1B0B-44E4-4F67-B0B6-43CD2734F30A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA0A9081-15D2-44F7-B66E-5C594F7C8066\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"DC06C851-23E7-4793-9BB0-A1172B78B15F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"1AAE414B-CD2C-4FE1-9124-6F43040DDFB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CF66FD8-CDA5-4E44-8A0D-9FF07E8C1E05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDEBE106-40F1-439C-8154-187D89988C3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"AEFB9B30-9A07-4D28-B3EA-267D257B7E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"764E6777-2C42-46FE-A266-ABBEB05D0F1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"D90494BC-DEBB-47A2-9794-BAC0BF670A92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5FDBD38-369B-4007-8D9A-B65B83B2AABD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9AB53DF-7335-462E-B8CD-44DF0DCE3826\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"C278A7AA-1CA3-432D-9C22-772A288CC178\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"785DD62D-CA21-40EC-8AF0-8CC36CCB8304\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"AA133203-B4FE-415D-B9C8-7CDE1A7895D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8C73DC4-D85A-49A1-81BD-E9D145E42FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"019D49C1-4A4D-40EE-8242-A649BE03E38B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"E943A8AF-F993-4C1C-ADF1-06519694E4C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"C6A12A83-966B-4B6D-AE49-C1696819E548\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC4E36FE-C4C7-4C00-A65A-41F50FCE017D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"B46626AD-CF6B-4A1C-8103-0A616C053E5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"4842CD17-44B8-456D-9AC7-A295B4D4DBEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F933F2D2-1C1D-43F0-9BD2-4699716E4A94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D0954BD-CC9C-448F-A9C1-3FB71AB27D6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"FDC74428-66DF-4A88-A6F5-064160B4C72C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"44E0FC7E-30C1-49D7-9B89-4CB747B28CBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"1647DB93-A49C-4A04-B181-3465427D4B17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26873D65-5406-45AF-A7F4-14AF2C55D368\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7B147BB-1B2E-4F40-9FA7-1165B8F0B60D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"8155903D-1A5F-482E-B356-526E9A973BBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"F3938C6C-6855-4873-89EA-4C8B8EFD571C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"0E52120D-FBF7-4687-87A8-BC4AE07DC734\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E37750C-50F3-480A-AA40-23D59F50E4B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73FB842B-33B1-4AD4-AC61-47192A87A785\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"04FFF651-F115-4591-BA61-E099DE307168\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"FC136CEA-2431-4D53-B898-E245826A9995\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"1CD177FA-262E-4874-9850-4E8525181ACE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F754F6FC-2A29-453F-9E9B-39C779830562\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"509A4307-3EC4-4AE7-AF72-3C2B3CF9E754\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.1.4.6\", \"versionEndIncluding\": \"14.1.5\", \"matchCriteriaId\": \"854D89CF-0E69-4BA9-A881-02673E3D91F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.1.5.1\", \"versionEndIncluding\": \"15.1.8\", \"matchCriteriaId\": \"D03D7294-C5CD-4EC1-8200-A998AED7F8E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.1.2.2\", \"versionEndIncluding\": \"16.1.3\", \"matchCriteriaId\": \"D2DACFE8-5E0B-49EC-894E-175591E9C775\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:13.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC4686BF-A9FA-4770-BD06-74BA4CA49FCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88B13312-1958-4B5C-BD4B-2075F6BF8C98\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"\\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\\n\\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad de cadena de formato en iControl SOAP que permite a un atacante autenticado bloquear el proceso CGI de iControl SOAP o, potencialmente, ejecutar c\\u00f3digo arbitrario. En el modo de dispositivo BIG-IP, una explotaci\\u00f3n exitosa de esta vulnerabilidad puede permitir al atacante cruzar un l\\u00edmite de seguridad. Nota: Las versiones de software que han llegado al final del soporte t\\u00e9cnico (EoTS) no se eval\\u00faan.\"}]",
      "id": "CVE-2023-22374",
      "lastModified": "2024-11-21T07:44:39.350",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"f5sirt@f5.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 6.0}]}",
      "published": "2023-02-01T18:15:11.363",
      "references": "[{\"url\": \"https://my.f5.com/manage/s/article/K000130415\", \"source\": \"f5sirt@f5.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://my.f5.com/manage/s/article/K000130415\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "f5sirt@f5.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"f5sirt@f5.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-134\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-134\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-22374\",\"sourceIdentifier\":\"f5sirt@f5.com\",\"published\":\"2023-02-01T18:15:11.363\",\"lastModified\":\"2024-11-21T07:44:39.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\\n\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de cadena de formato en iControl SOAP que permite a un atacante autenticado bloquear el proceso CGI de iControl SOAP o, potencialmente, ejecutar c\u00f3digo arbitrario. En el modo de dispositivo BIG-IP, una explotaci\u00f3n exitosa de esta vulnerabilidad puede permitir al atacante cruzar un l\u00edmite de seguridad. Nota: Las versiones de software que han llegado al final del soporte t\u00e9cnico (EoTS) no se eval\u00faan.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"f5sirt@f5.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"f5sirt@f5.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-134\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-134\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"BEFCEE4A-EFF7-4622-964D-29706B0D0788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"65BD1840-28C2-42B7-BE75-081DE24081A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"3D511799-6CEE-4337-BF66-38D7AF4D68C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E688B1-28C4-4F9A-9474-381FD22E792D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD637AF5-F7D1-428F-955E-16756B7476E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"32BBAAC4-BCC4-4A84-A579-4356EF78AA22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"AA72ED00-F966-4762-9025-3DB63A1640A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"0279F4AF-C297-47B3-A1DD-C99DF6AAD215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"200AC72D-719D-4663-BE05-C9C7826DEA68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8332960-4AAE-4101-8FFF-2D07B6479BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"4B721D9E-AD2F-44C9-9163-3785AA1A8441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"2685F058-2BEF-4189-BFBC-2F223C776A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"79DD896D-ABC7-485B-8810-39BB65DAF76C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"129F1B0B-44E4-4F67-B0B6-43CD2734F30A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA0A9081-15D2-44F7-B66E-5C594F7C8066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"DC06C851-23E7-4793-9BB0-A1172B78B15F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"1AAE414B-CD2C-4FE1-9124-6F43040DDFB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF66FD8-CDA5-4E44-8A0D-9FF07E8C1E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDEBE106-40F1-439C-8154-187D89988C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"AEFB9B30-9A07-4D28-B3EA-267D257B7E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"764E6777-2C42-46FE-A266-ABBEB05D0F1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"D90494BC-DEBB-47A2-9794-BAC0BF670A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5FDBD38-369B-4007-8D9A-B65B83B2AABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9AB53DF-7335-462E-B8CD-44DF0DCE3826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"C278A7AA-1CA3-432D-9C22-772A288CC178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"785DD62D-CA21-40EC-8AF0-8CC36CCB8304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"AA133203-B4FE-415D-B9C8-7CDE1A7895D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C73DC4-D85A-49A1-81BD-E9D145E42FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"019D49C1-4A4D-40EE-8242-A649BE03E38B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"E943A8AF-F993-4C1C-ADF1-06519694E4C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"C6A12A83-966B-4B6D-AE49-C1696819E548\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4E36FE-C4C7-4C00-A65A-41F50FCE017D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"B46626AD-CF6B-4A1C-8103-0A616C053E5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"4842CD17-44B8-456D-9AC7-A295B4D4DBEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F933F2D2-1C1D-43F0-9BD2-4699716E4A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0954BD-CC9C-448F-A9C1-3FB71AB27D6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"FDC74428-66DF-4A88-A6F5-064160B4C72C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"44E0FC7E-30C1-49D7-9B89-4CB747B28CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"1647DB93-A49C-4A04-B181-3465427D4B17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26873D65-5406-45AF-A7F4-14AF2C55D368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B147BB-1B2E-4F40-9FA7-1165B8F0B60D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"8155903D-1A5F-482E-B356-526E9A973BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"F3938C6C-6855-4873-89EA-4C8B8EFD571C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"0E52120D-FBF7-4687-87A8-BC4AE07DC734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E37750C-50F3-480A-AA40-23D59F50E4B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73FB842B-33B1-4AD4-AC61-47192A87A785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"04FFF651-F115-4591-BA61-E099DE307168\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"FC136CEA-2431-4D53-B898-E245826A9995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"1CD177FA-262E-4874-9850-4E8525181ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F754F6FC-2A29-453F-9E9B-39C779830562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509A4307-3EC4-4AE7-AF72-3C2B3CF9E754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.4.6\",\"versionEndIncluding\":\"14.1.5\",\"matchCriteriaId\":\"854D89CF-0E69-4BA9-A881-02673E3D91F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.5.1\",\"versionEndIncluding\":\"15.1.8\",\"matchCriteriaId\":\"D03D7294-C5CD-4EC1-8200-A998AED7F8E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.2.2\",\"versionEndIncluding\":\"16.1.3\",\"matchCriteriaId\":\"D2DACFE8-5E0B-49EC-894E-175591E9C775\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:13.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4686BF-A9FA-4770-BD06-74BA4CA49FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B13312-1958-4B5C-BD4B-2075F6BF8C98\"}]}]}],\"references\":[{\"url\":\"https://my.f5.com/manage/s/article/K000130415\",\"source\":\"f5sirt@f5.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://my.f5.com/manage/s/article/K000130415\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://my.f5.com/manage/s/article/K000130415\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T10:07:06.534Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-22374\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-26T17:50:54.452809Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-26T17:50:57.601Z\"}}], \"cna\": {\"title\": \"iControl SOAP vulnerability\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention and following the highest standards of coordinated disclosure.\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"Appliance Mode\"}]}], \"affected\": [{\"vendor\": \"F5\", \"modules\": [\"All Modules\"], \"product\": \"BIG-IP\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"17.0.0\", \"lessThan\": \"17.1.0\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"16.1.2.2\", \"lessThan\": \"16.1.3.4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"15.1.5.1\", \"lessThan\": \"15.1.8.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"14.1.4.6\", \"lessThan\": \"14.1.5.4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"Engineering Hotfix Available\", \"status\": \"unaffected\"}], \"version\": \"13.1.5\", \"lessThan\": \"*\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2023-02-01T15:00:00.000Z\", \"references\": [{\"url\": \"https://my.f5.com/manage/s/article/K000130415\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\nA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\\n\\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eA format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.\u003c/span\u003e\\n\u0026nbsp;Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-134\", \"description\": \"CWE-134 Use of Externally-Controlled Format String\"}]}], \"providerMetadata\": {\"orgId\": \"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab\", \"shortName\": \"f5\", \"dateUpdated\": \"2023-10-04T02:11:45.387Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-22374\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-26T17:51:00.789Z\", \"dateReserved\": \"2023-01-13T06:43:37.145Z\", \"assignerOrgId\": \"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab\", \"datePublished\": \"2023-02-01T17:54:46.798Z\", \"assignerShortName\": \"f5\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…