CVE-2023-22374

A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.


ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.5 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
f5CNA
8.5 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
f5big-ip_access_policy_manager
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_access_policy_manager
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_access_policy_manager
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_access_policy_manager
13.1.5
f5big-ip_access_policy_manager
17.0.0
f5big-ip_advanced_firewall_manager
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_advanced_firewall_manager
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_advanced_firewall_manager
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_advanced_firewall_manager
13.1.5
f5big-ip_advanced_firewall_manager
17.0.0
f5big-ip_analytics
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_analytics
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_analytics
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_analytics
13.1.5
f5big-ip_analytics
17.0.0
f5big-ip_application_acceleration_manager
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_application_acceleration_manager
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_application_acceleration_manager
13.1.5
f5big-ip_application_acceleration_manager
17.0.0
f5big-ip_application_security_manager
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_application_security_manager
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_application_security_manager
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_application_security_manager
13.1.0
f5big-ip_application_security_manager
17.0.0
f5big-ip_ddos_hybrid_defender
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_ddos_hybrid_defender
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_ddos_hybrid_defender
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_ddos_hybrid_defender
13.1.5
f5big-ip_domain_name_system
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_domain_name_system
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_domain_name_system
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_domain_name_system
17.0.0
f5big-ip_fraud_protection_service
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_fraud_protection_service
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_fraud_protection_service
13.1.5
f5big-ip_fraud_protection_service
17.0.0
f5big-ip_link_controller
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_link_controller
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_link_controller
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_link_controller
13.1.5
f5big-ip_link_controller
17.0.0
f5big-ip_local_traffic_manager
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_local_traffic_manager
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_local_traffic_manager
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_local_traffic_manager
13.1.5
f5big-ip_local_traffic_manager
17.0.0
f5big-ip_policy_enforcement_manager
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_policy_enforcement_manager
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_policy_enforcement_manager
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_policy_enforcement_manager
13.1.5
f5big-ip_policy_enforcement_manager
17.0.0
f5big-ip_ssl_orchestrator
14.1.4.6 ≤
𝑥
≤ 14.1.5
f5big-ip_ssl_orchestrator
15.1.5.1 ≤
𝑥
≤ 15.1.8
f5big-ip_ssl_orchestrator
16.1.2.2 ≤
𝑥
≤ 16.1.3
f5big-ip_ssl_orchestrator
13.1.5
f5big-ip_ssl_orchestrator
17.0.0
𝑥
= Vulnerable software versions