First published: Thu Aug 04 2022(Updated: )
In BIG-IP Versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, an authenticated attacker with Resource Administrator or Manager privileges can create or modify existing monitor objects in the Configuration utility in an undisclosed manner leading to a privilege escalation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=13.1.0<=13.1.5 | |
F5 Access Policy Manager | >=14.1.0<14.1.5.1 | |
F5 Access Policy Manager | >=15.1.0<15.1.6.1 | |
F5 Access Policy Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Advanced Firewall Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.5 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Analytics | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Application Acceleration Manager | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Application Acceleration Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Application Acceleration Manager | >=16.1.0<16.1.3.1 | |
F5 Application Security Manager | >=13.1.0<=13.1.5 | |
F5 Application Security Manager | >=14.1.0<14.1.5.1 | |
F5 Application Security Manager | >=15.1.0<15.1.6.1 | |
F5 Application Security Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP | >=13.1.0<=13.1.5 | |
F5 BIG-IP | >=14.1.0<14.1.5.1 | |
F5 BIG-IP | >=15.1.0<15.1.6.1 | |
F5 BIG-IP | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<=13.1.5 | |
F5 BIG-IP Fraud Protection Service | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Fraud Protection Service | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Fraud Protection Service | >=16.1.0<16.1.3.1 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.5 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.5.1 | |
Riverbed SteelApp Traffic Manager | >=15.1.0<15.1.6.1 | |
Riverbed SteelApp Traffic Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Link Controller | >=13.1.0<=13.1.5 | |
F5 BIG-IP Link Controller | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Link Controller | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Link Controller | >=16.1.0<16.1.3.1 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.5 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.5.1 | |
Riverbed SteelApp Traffic Manager | >=15.1.0<15.1.6.1 | |
Riverbed SteelApp Traffic Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Policy Enforcement Manager | >=16.1.0<16.1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-35735.
F5 BIG-IP Access Policy Manager, F5 BIG-IP Advanced Firewall Manager, F5 BIG-IP Analytics, F5 BIG-IP Application Acceleration Manager, F5 BIG-IP Application Security Manager, F5 BIG-IP Domain Name System, F5 BIG-IP Fraud Protection Service, F5 BIG-IP Global Traffic Manager, F5 BIG-IP Link Controller, F5 BIG-IP Local Traffic Manager, F5 BIG-IP Policy Enforcement Manager.
The severity of CVE-2022-35735 is high with a CVSS score of 7.2.
An authenticated attacker with Resource Administrator or Manager privileges can create or modify existing monitor objects in the Configuration utility.
Yes, upgrading to the patched versions listed in the vendor advisory will fix this vulnerability.