CVE-2022-41800

In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.7 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
f5CNA
8.7 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
f5big-ip_access_policy_manager
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_access_policy_manager
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_access_policy_manager
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_access_policy_manager
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_access_policy_manager
17.0.0
f5big-ip_advanced_firewall_manager
13.1.0 ≤
𝑥
≤ 17.0.0
f5big-ip_analytics
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_analytics
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_analytics
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_analytics
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_analytics
17.0.0
f5big-ip_application_acceleration_manager
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_application_acceleration_manager
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_application_acceleration_manager
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_application_acceleration_manager
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_application_acceleration_manager
17.0.0
f5big-ip_application_security_manager
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_application_security_manager
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_application_security_manager
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_application_security_manager
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_application_security_manager
17.0.0
f5big-ip_domain_name_system
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_domain_name_system
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_domain_name_system
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_domain_name_system
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_domain_name_system
17.0.0
f5big-ip_fraud_protection_service
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_fraud_protection_service
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_fraud_protection_service
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_fraud_protection_service
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_fraud_protection_service
17.0.0
f5big-ip_global_traffic_manager
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_global_traffic_manager
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_global_traffic_manager
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_global_traffic_manager
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_global_traffic_manager
17.0.0
f5big-ip_link_controller
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_link_controller
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_link_controller
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_link_controller
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_link_controller
17.0.0
f5big-ip_local_traffic_manager
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_local_traffic_manager
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_local_traffic_manager
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_local_traffic_manager
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_local_traffic_manager
17.0.0
f5big-ip_policy_enforcement_manager
13.1.0 ≤
𝑥
≤ 13.1.5
f5big-ip_policy_enforcement_manager
14.1.0 ≤
𝑥
≤ 14.1.5
f5big-ip_policy_enforcement_manager
15.1.0 ≤
𝑥
≤ 15.1.8
f5big-ip_policy_enforcement_manager
16.1.0 ≤
𝑥
≤ 16.1.3
f5big-ip_policy_enforcement_manager
17.0.0
𝑥
= Vulnerable software versions