On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, a flaw in the way reply ICMP packets are limited in the Traffic Management Microkernel (TMM) allows an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K41440465 | Vendor Advisory |
https://support.f5.com/csp/article/K41440465 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.f5.com/csp/article/K41440465Â - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.4 |
Information
Published : 2022-05-05 17:15
Updated : 2024-11-21 06:53
NVD link : CVE-2022-26071
Mitre link : CVE-2022-26071
CVE.ORG link : CVE-2022-26071
JSON object : View
Products Affected
f5
- big-ip_advanced_firewall_manager
- big-ip_application_acceleration_manager
- big-ip_policy_enforcement_manager
- big-ip_global_traffic_manager
- big-ip_local_traffic_manager
- big-ip_access_policy_manager
- big-ip_fraud_protection_service
- big-ip_analytics
- big-ip_domain_name_system
- big-ip_application_security_manager
- big-ip_link_controller
CWE
CWE-330
Use of Insufficiently Random Values