On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K81952114 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-05-05 17:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-26415
Mitre link : CVE-2022-26415
CVE.ORG link : CVE-2022-26415
JSON object : View
Products Affected
f5
- big-ip_analytics
- big-ip_link_controller
- big-ip_access_policy_manager
- big-ip_global_traffic_manager
- big-ip_fraud_protection_service
- big-ip_advanced_firewall_manager
- big-ip_local_traffic_manager
- big-ip_policy_enforcement_manager
- big-ip_application_security_manager
- big-ip_application_acceleration_manager
- big-ip_domain_name_system
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')