First published: Thu Aug 04 2022(Updated: )
In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, and BIG-IQ version 8.x before 8.2.0 and all versions of 7.x, an authenticated user's iControl REST token may remain valid for a limited time after logging out from the Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=13.1.0<=13.1.5 | |
F5 Access Policy Manager | >=14.1.0<14.1.5.1 | |
F5 Access Policy Manager | >=15.1.0<15.1.6.1 | |
F5 Access Policy Manager | >=16.1.0<16.1.3.1 | |
F5 Access Policy Manager | =17.0.0 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Advanced Firewall Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Advanced Firewall Manager | =17.0.0 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.5 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Analytics | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Analytics | =17.0.0 | |
f5 big-ip application acceleration manager | >=13.1.0<=13.1.5 | |
f5 big-ip application acceleration manager | >=14.1.0<14.1.5.1 | |
f5 big-ip application acceleration manager | >=15.1.0<15.1.6.1 | |
f5 big-ip application acceleration manager | >=16.1.0<16.1.3.1 | |
f5 big-ip application acceleration manager | =17.0.0 | |
F5 Application Security Manager | >=13.1.0<=13.1.5 | |
F5 Application Security Manager | >=14.1.0<14.1.5.1 | |
F5 Application Security Manager | >=15.1.0<15.1.6.1 | |
F5 Application Security Manager | >=16.1.0<16.1.3.1 | |
F5 Application Security Manager | =17.0.0 | |
f5 big-ip domain name system | >=13.1.0<=13.1.5 | |
f5 big-ip domain name system | >=14.1.0<14.1.5.1 | |
f5 big-ip domain name system | >=15.1.0<15.1.6.1 | |
f5 big-ip domain name system | >=16.1.0<16.1.3.1 | |
f5 big-ip domain name system | =17.0.0 | |
F5 BIG-IP fraud protection services | >=13.1.0<=13.1.5 | |
F5 BIG-IP fraud protection services | >=14.1.0<14.1.5.1 | |
F5 BIG-IP fraud protection services | >=15.1.0<15.1.6.1 | |
F5 BIG-IP fraud protection services | >=16.1.0<16.1.3.1 | |
F5 BIG-IP fraud protection services | =17.0.0 | |
F5 BIG-IP Global Traffic Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Global Traffic Manager | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Global Traffic Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Global Traffic Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Global Traffic Manager | =17.0.0 | |
F5 BIG-IP | >=13.1.0<=13.1.5 | |
F5 BIG-IP | >=14.1.0<14.1.5.1 | |
F5 BIG-IP | >=15.1.0<15.1.6.1 | |
F5 BIG-IP | >=16.1.0<16.1.3.1 | |
F5 BIG-IP | =17.0.0 | |
F5 BIG-IP Local Traffic Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Local Traffic Manager | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Local Traffic Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Local Traffic Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Local Traffic Manager | =17.0.0 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Policy Enforcement Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Policy Enforcement Manager | =17.0.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =7.0.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =7.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =8.0.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =8.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35728 has been classified as a high severity vulnerability.
To fix CVE-2022-35728, it's recommended to upgrade to the latest patched version of the affected F5 BIG-IP or BIG-IQ software.
CVE-2022-35728 affects F5 BIG-IP versions prior to 17.0.0.1, 16.1.3.1, 15.1.6.1, 14.1.5.1, and all versions of 13.1.x, as well as all versions of BIG-IQ before 8.2.0 and all version of 7.x.
CVE-2022-35728 can potentially be exploited to maintain unauthorized access via a valid iControl REST token of an authenticated user.
Currently, there are no suggested workarounds for CVE-2022-35728 beyond upgrading to the patched software.