First published: Wed Feb 01 2023(Updated: )
A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=14.1.4.6<=14.1.5 | |
F5 Access Policy Manager | >=15.1.5.1<=15.1.8 | |
F5 Access Policy Manager | >=16.1.2.2<=16.1.3 | |
F5 Access Policy Manager | =13.1.5 | |
F5 Access Policy Manager | =17.0.0 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.4.6<=14.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.5.1<=15.1.8 | |
F5 BIG-IP Advanced Firewall Manager | >=16.1.2.2<=16.1.3 | |
F5 BIG-IP Advanced Firewall Manager | =13.1.5 | |
F5 BIG-IP Advanced Firewall Manager | =17.0.0 | |
F5 BIG-IP Analytics | >=14.1.4.6<=14.1.5 | |
F5 BIG-IP Analytics | >=15.1.5.1<=15.1.8 | |
F5 BIG-IP Analytics | >=16.1.2.2<=16.1.3 | |
F5 BIG-IP Analytics | =13.1.5 | |
F5 BIG-IP Analytics | =17.0.0 | |
f5 big-ip application acceleration manager | >=15.1.5.1<=15.1.8 | |
f5 big-ip application acceleration manager | >=16.1.2.2<=16.1.3 | |
f5 big-ip application acceleration manager | =13.1.5 | |
f5 big-ip application acceleration manager | =17.0.0 | |
F5 Application Security Manager | >=14.1.4.6<=14.1.5 | |
F5 Application Security Manager | >=15.1.5.1<=15.1.8 | |
F5 Application Security Manager | >=16.1.2.2<=16.1.3 | |
F5 Application Security Manager | =13.1.0 | |
F5 Application Security Manager | =17.0.0 | |
F5 BIG-IP DDoS Hybrid Defender | >=14.1.4.6<=14.1.5 | |
F5 BIG-IP DDoS Hybrid Defender | >=15.1.5.1<=15.1.8 | |
F5 BIG-IP DDoS Hybrid Defender | >=16.1.2.2<=16.1.3 | |
F5 BIG-IP DDoS Hybrid Defender | =13.1.5 | |
f5 big-ip domain name system | >=14.1.4.6<=14.1.5 | |
f5 big-ip domain name system | >=15.1.5.1<=15.1.8 | |
f5 big-ip domain name system | >=16.1.2.2<=16.1.3 | |
f5 big-ip domain name system | =17.0.0 | |
F5 BIG-IP fraud protection services | >=15.1.5.1<=15.1.8 | |
F5 BIG-IP fraud protection services | >=16.1.2.2<=16.1.3 | |
F5 BIG-IP fraud protection services | =13.1.5 | |
F5 BIG-IP fraud protection services | =17.0.0 | |
F5 BIG-IP | >=14.1.4.6<=14.1.5 | |
F5 BIG-IP | >=15.1.5.1<=15.1.8 | |
F5 BIG-IP | >=16.1.2.2<=16.1.3 | |
F5 BIG-IP | =13.1.5 | |
F5 BIG-IP | =17.0.0 | |
F5 BIG-IP Local Traffic Manager | >=14.1.4.6<=14.1.5 | |
F5 BIG-IP Local Traffic Manager | >=15.1.5.1<=15.1.8 | |
F5 BIG-IP Local Traffic Manager | >=16.1.2.2<=16.1.3 | |
F5 BIG-IP Local Traffic Manager | =13.1.5 | |
F5 BIG-IP Local Traffic Manager | =17.0.0 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.4.6<=14.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.5.1<=15.1.8 | |
F5 BIG-IP Policy Enforcement Manager | >=16.1.2.2<=16.1.3 | |
F5 BIG-IP Policy Enforcement Manager | =13.1.5 | |
F5 BIG-IP Policy Enforcement Manager | =17.0.0 | |
F5 BIG-IP SSL Orchestrator | >=14.1.4.6<=14.1.5 | |
F5 BIG-IP SSL Orchestrator | >=15.1.5.1<=15.1.8 | |
F5 BIG-IP SSL Orchestrator | >=16.1.2.2<=16.1.3 | |
F5 BIG-IP SSL Orchestrator | =13.1.5 | |
F5 BIG-IP SSL Orchestrator | =17.0.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =17.0.0 | 17.1.0 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.2.2<=16.1.3 | 16.1.3.4 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.5.1<=15.1.8 | 15.1.8.2 |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.4.6<=14.1.5 | 14.1.5.4 |
F5 BIG-IP and BIG-IQ Centralized Management | =13.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22374 has been classified as a critical vulnerability due to its potential to crash processes or execute arbitrary code.
CVE-2023-22374 affects multiple versions of F5 BIG-IP, including versions 13.1.5, 14.1.4.6 to 14.1.5, 15.1.5.1 to 15.1.8, 16.1.2.2 to 16.1.3, and 17.0.0.
To remediate CVE-2023-22374, upgrade to the patched versions provided by F5, including 17.1.0, 16.1.3.4, 15.1.8.2, and 14.1.5.4.
CVE-2023-22374 allows an authenticated attacker to cause denial of service by crashing the iControl SOAP CGI process or potentially executing arbitrary code.
Yes, the attacker must be authenticated to exploit CVE-2023-22374.