First published: Tue Jan 25 2022(Updated: )
In all versions before 7.2.1.4, when proxy settings are configured in the network access resource of a BIG-IP APM system, connecting BIG-IP Edge Client on Mac and Windows is vulnerable to a DNS rebinding attack. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Access Policy Manager | >=11.6.1<=11.6.5 | |
F5 Big-ip Access Policy Manager | >=12.1.0<=12.1.6 | |
F5 Big-ip Access Policy Manager | >=13.1.0<=13.1.4 | |
F5 Big-ip Access Policy Manager | >=14.1.0<=14.1.4 | |
F5 Big-ip Access Policy Manager | >=15.1.0<=15.1.5 | |
F5 Big-ip Access Policy Manager | >=16.0.0<=16.1.2 | |
F5 Big-ip Access Policy Manager Client | >=7.1.6<=7.1.9 | |
F5 Big-ip Access Policy Manager Client | >=7.2.1<=7.2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-23032.
In all versions before 7.2.1.4 of F5 Big-ip Access Policy Manager and before 7.2.1.3 of F5 Big-ip Access Policy Manager Client are affected.
The severity of CVE-2022-23032 is medium, with a severity value of 5.3.
When proxy settings are configured in the network access resource of a BIG-IP APM system, connecting BIG-IP Edge Client on Mac and Windows is vulnerable to a DNS rebinding attack.
To fix CVE-2022-23032, upgrade to version 7.2.1.4 or later for F5 Big-ip Access Policy Manager and version 7.2.1.3 or later for F5 Big-ip Access Policy Manager Client.