In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.5.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, using an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K11010341 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-08-04 18:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-35243
Mitre link : CVE-2022-35243
CVE.ORG link : CVE-2022-35243
JSON object : View
Products Affected
f5
- big-ip_analytics
- big-ip_link_controller
- big-ip_access_policy_manager
- big-ip_global_traffic_manager
- big-ip_fraud_protection_service
- big-ip_advanced_firewall_manager
- big-ip_local_traffic_manager
- big-ip_policy_enforcement_manager
- big-ip_application_security_manager
- big-ip_application_acceleration_manager
- big-ip_domain_name_system
CWE
CWE-269
Improper Privilege Management