First published: Wed Oct 19 2022(Updated: )
In BIG-IP versions 16.1.x before 16.1.3, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, and BIG-IQ versions 8.x before 8.2.0.1 and all versions of 7.x, when an SSL key is imported on a BIG-IP or BIG-IQ system, undisclosed input can cause MCPD to terminate.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Access Policy Manager | >=14.1.0<14.1.5 | |
F5 BIG-IP Access Policy Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Access Policy Manager | >=16.1.0<16.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Advanced Firewall Manager | >=16.1.0<16.1.3 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.5 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.5 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Analytics | >=16.1.0<16.1.3 | |
F5 Big-ip Application Acceleration Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Application Acceleration Manager | >=14.1.0<14.1.5 | |
F5 Big-ip Application Acceleration Manager | >=15.1.0<15.1.6.1 | |
F5 Big-ip Application Acceleration Manager | >=16.1.0<16.1.3 | |
F5 BIG-IP Application Security Manager | >=13.1.0<13.1.5 | |
F5 BIG-IP Application Security Manager | >=14.1.0<14.1.5 | |
F5 BIG-IP Application Security Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Application Security Manager | >=16.1.0<16.1.3 | |
F5 Big-ip Domain Name System | >=13.1.0<=13.1.5 | |
F5 Big-ip Domain Name System | >=14.1.0<14.1.5 | |
F5 Big-ip Domain Name System | >=15.1.0<15.1.6.1 | |
F5 Big-ip Domain Name System | >=16.1.0<16.1.3 | |
F5 Big-ip Fraud Protection Service | >=13.1.0<=13.1.5 | |
F5 Big-ip Fraud Protection Service | >=14.1.0<14.1.5 | |
F5 Big-ip Fraud Protection Service | >=15.1.0<15.1.6.1 | |
F5 Big-ip Fraud Protection Service | >=16.1.0<16.1.3 | |
F5 Big-ip Global Traffic Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Global Traffic Manager | >=14.1.0<14.1.5 | |
F5 Big-ip Global Traffic Manager | >=15.1.0<15.1.6.1 | |
F5 Big-ip Global Traffic Manager | >=16.1.0<16.1.3 | |
F5 Big-ip Link Controller | >=13.1.0<=13.1.5 | |
F5 Big-ip Link Controller | >=14.1.0<14.1.5 | |
F5 Big-ip Link Controller | >=15.1.0<15.1.6.1 | |
F5 Big-ip Link Controller | >=16.1.0<16.1.3 | |
F5 Big-ip Local Traffic Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Local Traffic Manager | >=14.1.0<14.1.5 | |
F5 Big-ip Local Traffic Manager | >=15.1.0<15.1.6.1 | |
F5 Big-ip Local Traffic Manager | >=16.1.0<16.1.3 | |
F5 Big-ip Policy Enforcement Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Policy Enforcement Manager | >=14.1.0<14.1.5 | |
F5 Big-ip Policy Enforcement Manager | >=15.1.0<15.1.6.1 | |
F5 Big-ip Policy Enforcement Manager | >=16.1.0<16.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-41694 is medium with a severity value of 4.9.
BIG-IP versions 13.1.x, 14.1.x, 15.1.x, and 16.1.x are affected by CVE-2022-41694.
BIG-IQ versions 7.x and 8.x are affected by CVE-2022-41694.
To fix CVE-2022-41694, update to BIG-IP versions 16.1.3, 15.1.6.1, 14.1.5, or later, and update to BIG-IQ versions 8.2.0.1 or later.
More information about CVE-2022-41694 can be found at the following link: [support.f5.com/csp/article/K64829234](https://support.f5.com/csp/article/K64829234)