cve-2023-22839
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
BIG-IP DNS profile vulnerability
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://my.f5.com/manage/s/article/K37708118 | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K37708118" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "DNS", "LTM enabled with DNS Services license" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8.1", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:56:26.064Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K37708118" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP DNS profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22839", "datePublished": "2023-02-01T17:56:26.064Z", "dateReserved": "2023-01-13T06:43:46.141Z", "dateUpdated": "2024-08-02T10:20:31.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-22839\",\"sourceIdentifier\":\"f5sirt@f5.com\",\"published\":\"2023-02-01T18:15:11.750\",\"lastModified\":\"2023-11-07T04:07:27.390\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"f5sirt@f5.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"f5sirt@f5.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"08B25AAB-A98C-4F89-9131-29E3A8C0ED23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndExcluding\":\"14.1.5.3\",\"matchCriteriaId\":\"7DBB52D1-4FB8-4A71-8F83-02D7DDB99F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndExcluding\":\"15.1.7\",\"matchCriteriaId\":\"313014B4-8033-4B57-B838-66EE163E86D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndExcluding\":\"16.1.3.3\",\"matchCriteriaId\":\"203B2B00-7DA5-443D-B4AA-DE0814D7E04D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.0.0\",\"versionEndExcluding\":\"17.0.0.2\",\"matchCriteriaId\":\"93721140-2035-4431-BF5F-CA0C78BBFE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.5\",\"matchCriteriaId\":\"0360F76D-E75E-4B05-A294-B47012323ED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndExcluding\":\"14.1.5.3\",\"matchCriteriaId\":\"EE9B290B-21D9-40B0-8A6D-36F2C310C71A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.1.0\",\"versionEndExcluding\":\"15.1.7\",\"matchCriteriaId\":\"E25D2597-32D7-4676-9A0C-FCAD8D8900A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.1.0\",\"versionEndExcluding\":\"16.1.3.3\",\"matchCriteriaId\":\"F11221E1-8354-4854-A75D-060721E9671F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.0.0\",\"versionEndExcluding\":\"17.0.0.2\",\"matchCriteriaId\":\"5FAB540A-6082-4F6E-9CDE-0AB719B1001F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F510CA2D-E049-4884-AB80-EC03560556EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59AA4F5-B072-4866-9912-FCBB5F77F8EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"755CF51B-61AD-4C1E-9954-C44EC30E4339\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C37E575D-5674-4BD6-9C24-D318A905FD4E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE455B9-7497-42EE-A6D2-EFEB0E9B5589\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5E0FBD3-584B-4E20-A664-AFC8B224466C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF87EE2-1A8A-4050-8168-C4C8A1E49AD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FA594DF-0441-4761-80AD-C3C64BD1BA59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF35744-F9B6-43FD-804D-955EC5AC7360\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA95257-25F5-483A-BBE5-F906EAF2BCF9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E943FF-3EE2-4F87-B005-80432EB4FB67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD50226B-5D1A-44A0-B530-BBDB50CDC30F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF21909-A75A-42ED-AAF4-3BC3EE412BA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B405FC13-0B14-4497-8BE8-E09CE5369DE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046B8D26-64B8-46C4-921A-983E0AE82752\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1685A2-60F2-4B06-A68E-FC2E18CF3BEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5FE621-B69A-4E93-B5FB-AC7C47A73766\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC83C650-6120-4FD8-85FC-131B7E78F9FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4928A6CA-6FD3-405F-878F-12A199C54C03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F768A343-E31B-4A0B-A1CE-B884BCF8DE96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E48A49B-586A-4585-8952-EBF30E8C726C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25711D89-A9A6-41E8-8DAB-FBFA9CADB69B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"906F880E-4C8D-49B7-8C61-2C22348373CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F03D79-CEC3-4EB0-8105-78AD07DDC8C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67973F6-506B-43EC-94A5-9EBCBD5131FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9A1D2B-33AA-4691-9891-4360B9B026EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B37E2A71-1BDC-4556-8204-2A3140EA2923\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"323F3F62-98B5-4FE4-8FFA-F20AF5F1745F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21BD097C-73F2-4EB7-9024-3DC63EC419D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D848D43B-F994-45CF-AA53-ED0D4ACEDE8C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A81F6A51-9AEF-4502-B19C-449CC9FA7154\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16C46A4D-3773-4EB4-B397-D02694FC65BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D524EE-B941-4D73-A83F-02C3253492D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"842E7F16-4CB8-450F-BF18-829BAEFAF6CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C53B31C-E56F-4FD4-9B51-A741DA8FE479\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7569487-6D88-46CC-9B70-59D56DB0CE35\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EDC8F7B-D052-4DAB-B572-17241E02DC01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B494DEE-B373-4B3F-95C1-2E0997F32B6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D400BBB2-399D-41C9-B73B-BDC280B5A51E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BC625D5-C59F-4D20-BA92-0EC85DAB8AFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B5D6038-EB49-47DE-BC4A-8E9888F217DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4233544A-999C-42CD-9B61-E639AAA460B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43CDBB9F-B6BD-4103-82E8-D66E067704C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24DA75BA-A4B7-46BD-887D-03CDFAF22791\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"612904C3-0EA5-4F56-BDFE-1A2114C28EEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52B4EBB6-BEEB-42DA-A146-10E401226BED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF08F72-E905-48C4-9339-0F23EE462CC5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55433400-8996-44B8-94D7-81690145EF94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8AB5834-CB4C-46AD-A0C6-E3800DE89453\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5918B702-39A4-48F5-B381-7FFF0ABE4920\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19F04564-25E9-4962-949D-6C810091464D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE3FCE60-4F2F-48FA-A0AC-89DE82118411\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBFBFFE7-EA68-46E0-A172-FABDD99D7D8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9940F471-FA88-49FB-B1BD-752366F9A15C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58A0DEB-F0C7-40BD-ACE3-49F0CD5663D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD814768-9507-4C58-9398-6898C3F49272\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83532FB3-30DE-44B9-A1B7-551F91E61C9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C0B96E2-7E5D-4C82-B4C5-3F35CD650962\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DD6188-94B2-43BE-93C8-F2493E2C2C23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"776A5309-2A92-462B-9CAB-067F5E522386\"}]}]}],\"references\":[{\"url\":\"https://my.f5.com/manage/s/article/K37708118\",\"source\":\"f5sirt@f5.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.