CVE-2021-22974

On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.6 and all versions of BIG-IQ 7.x and 6.x, an authenticated attacker with access to iControl REST over the control plane may be able to take advantage of a race condition to execute commands with an elevated privilege level. This vulnerability is due to an incomplete fix for CVE-2017-6167. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Race Condition
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
f5CNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
f5big-ip_access_policy_manager
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_access_policy_manager
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_access_policy_manager
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_access_policy_manager
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_advanced_firewall_manager
13.1.0 ≤
𝑥
< 13.1.3.5
f5big-ip_advanced_firewall_manager
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_advanced_firewall_manager
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_advanced_firewall_manager
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_advanced_web_application_firewall
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_advanced_web_application_firewall
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_advanced_web_application_firewall
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_advanced_web_application_firewall
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_analytics
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_analytics
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_analytics
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_analytics
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_application_acceleration_manager
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_application_acceleration_manager
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_application_acceleration_manager
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_application_acceleration_manager
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_application_security_manager
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_application_security_manager
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_application_security_manager
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_application_security_manager
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_ddos_hybrid_defender
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_ddos_hybrid_defender
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_ddos_hybrid_defender
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_ddos_hybrid_defender
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_domain_name_system
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_domain_name_system
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_domain_name_system
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_domain_name_system
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_fraud_protection_service
13.1.0 ≤
𝑥
< 13.1.3.5
f5big-ip_fraud_protection_service
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_fraud_protection_service
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_fraud_protection_service
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_global_traffic_manager
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_global_traffic_manager
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_global_traffic_manager
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_global_traffic_manager
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_link_controller
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_link_controller
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_link_controller
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_link_controller
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_local_traffic_manager
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_local_traffic_manager
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_local_traffic_manager
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_local_traffic_manager
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_policy_enforcement_manager
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_policy_enforcement_manager
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_policy_enforcement_manager
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_policy_enforcement_manager
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-ip_ssl_orchestrator
13.1.0 ≤
𝑥
< 13.1.3.6
f5big-ip_ssl_orchestrator
14.1.0 ≤
𝑥
< 14.1.3.1
f5big-ip_ssl_orchestrator
15.1.0 ≤
𝑥
< 15.1.2
f5big-ip_ssl_orchestrator
16.0.0 ≤
𝑥
< 16.0.1.1
f5big-iq_centralized_management
6.0.0 ≤
𝑥
≤ 6.1.0
f5big-iq_centralized_management
7.0.0 ≤
𝑥
≤ 7.1.0
𝑥
= Vulnerable software versions