First published: Wed Feb 01 2023(Updated: )
On F5OS-A beginning in version 1.2.0 to before 1.3.0 and F5OS-C beginning in version 1.3.0 to before 1.5.0, processing F5OS tenant file names may allow for command injection. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 F5OS-A | >=1.2.0<1.3.0 | |
F5 F5OS-C | >=1.3.0<1.5.0 | |
F5 F5OS-A | =1.2.0 | 1.3.03 |
F5 F5OS-C | >=1.3.0<=1.3.2 | 1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-22657 is high.
F5OS-A versions 1.2.0 to before 1.3.0 are affected by CVE-2023-22657.
F5OS-C versions 1.3.0 to before 1.5.0 are affected by CVE-2023-22657.
An attacker can exploit CVE-2023-22657 by injecting commands into F5OS tenant file names.
Yes, upgrading to F5OS-A version 1.3.0 or later and F5OS-C version 1.5.0 or later will fix CVE-2023-22657.