First published: Wed Aug 02 2023(Updated: )
An authenticated attacker with guest privileges or higher can cause the iControl SOAP process to terminate by sending undisclosed requests.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.0.0<=17.1.0 | 17.1.0.2 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.3 | 16.1.3.5 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.9 | 15.1.9.1 |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | 14.1.5.5 |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.2.0<=8.3.0 | 3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000133472 is categorized as a high-risk vulnerability that allows attackers to disrupt the iControl SOAP process.
To fix F5-K000133472, you should upgrade to the appropriate patched version of F5 BIG-IP or BIG-IQ Centralized Management as specified in the advisory.
F5-K000133472 affects users of F5 BIG-IP and F5 BIG-IQ Centralized Management running specific vulnerable versions listed in the advisory.
Authenticated attackers with guest privileges or higher can exploit F5-K000133472 by sending specific undisclosed requests to terminate the iControl SOAP process.
The potential impacts of F5-K000133472 include service disruption and degradation in the functionality of the affected systems.