First published: Thu May 05 2022(Updated: )
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=12.1.0<=12.1.6 | |
F5 BIG-IP Access Policy Manager | >=13.1.0<13.1.5 | |
F5 BIG-IP Access Policy Manager | >=14.1.0<14.1.4.6 | |
F5 BIG-IP Access Policy Manager | >=15.1.0<15.1.5.1 | |
F5 BIG-IP Access Policy Manager | >=16.1.0<16.1.2.2 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.6 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<13.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.4.6 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.5.1 | |
F5 BIG-IP Advanced Firewall Manager | >=16.1.0<16.1.2.2 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.6 | |
F5 BIG-IP Analytics | >=13.1.0<13.1.5 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.4.6 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.5.1 | |
F5 BIG-IP Analytics | >=16.1.0<16.1.2.2 | |
f5 big-ip application acceleration manager | >=12.1.0<=12.1.6 | |
f5 big-ip application acceleration manager | >=13.1.0<13.1.5 | |
f5 big-ip application acceleration manager | >=14.1.0<14.1.4.6 | |
f5 big-ip application acceleration manager | >=15.1.0<15.1.5.1 | |
f5 big-ip application acceleration manager | >=16.1.0<16.1.2.2 | |
F5 BIG-IP Application Security Manager | >=12.1.0<=12.1.6 | |
F5 BIG-IP Application Security Manager | >=13.1.0<13.1.5 | |
F5 BIG-IP Application Security Manager | >=14.1.0<14.1.4.6 | |
F5 BIG-IP Application Security Manager | >=15.1.0<15.1.5.1 | |
F5 BIG-IP Application Security Manager | >=16.1.0<16.1.2.2 | |
f5 big-ip domain name system | >=12.1.0<=12.1.6 | |
f5 big-ip domain name system | >=13.1.0<13.1.5 | |
f5 big-ip domain name system | >=14.1.0<14.1.4.6 | |
f5 big-ip domain name system | >=15.1.0<15.1.5.1 | |
f5 big-ip domain name system | >=16.1.0<16.1.2.2 | |
f5 big-ip fraud protection service | >=12.1.0<=12.1.6 | |
f5 big-ip fraud protection service | >=13.1.0<13.1.5 | |
f5 big-ip fraud protection service | >=14.1.0<14.1.4.6 | |
f5 big-ip fraud protection service | >=15.1.0<15.1.5.1 | |
f5 big-ip fraud protection service | >=16.1.0<16.1.2.2 | |
F5 BIG-IP Global Traffic Manager | >=12.1.0<=12.1.6 | |
F5 BIG-IP Global Traffic Manager | >=13.1.0<13.1.5 | |
F5 BIG-IP Global Traffic Manager | >=14.1.0<14.1.4.6 | |
F5 BIG-IP Global Traffic Manager | >=15.1.0<15.1.5.1 | |
F5 BIG-IP Global Traffic Manager | >=16.1.0<16.1.2.2 | |
f5 big-ip link controller | >=12.1.0<=12.1.6 | |
f5 big-ip link controller | >=13.1.0<13.1.5 | |
f5 big-ip link controller | >=14.1.0<14.1.4.6 | |
f5 big-ip link controller | >=15.1.0<15.1.5.1 | |
f5 big-ip link controller | >=16.1.0<16.1.2.2 | |
F5 BIG-IP Local Traffic Manager | >=12.1.0<=12.1.6 | |
F5 BIG-IP Local Traffic Manager | >=13.1.0<13.1.5 | |
F5 BIG-IP Local Traffic Manager | >=14.1.0<14.1.4.6 | |
F5 BIG-IP Local Traffic Manager | >=15.1.0<15.1.5.1 | |
F5 BIG-IP Local Traffic Manager | >=16.1.0<16.1.2.2 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.6 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<13.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.4.6 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<15.1.5.1 | |
F5 BIG-IP Policy Enforcement Manager | >=16.1.0<16.1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-26415 is categorized as critical, indicating a significant risk to affected systems.
To fix CVE-2022-26415, you should upgrade to the latest versions provided by F5 as specified in the security advisory.
CVE-2022-26415 affects F5 BIG-IP products, specifically versions prior to 16.1.2.2, 15.1.5.1, 14.1.4.6, 13.1.5, and all versions of 12.1.x.
CVE-2022-26415 is an authentication bypass vulnerability that could allow unauthorized access to system functions.
CVE-2022-26415 was publicly disclosed on March 22, 2022.