Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-24594

Опубликовано: 03 мая 2023
Источник: nvd
CVSS3: 5.3
EPSS Низкий

Описание

When an SSL profile is configured on a Virtual Server, undisclosed traffic can cause an increase in CPU or SSL accelerator resource utilization.  

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_analytics:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_analytics:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_analytics:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_security_manager:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_security_manager:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_carrier-grade_nat:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_carrier-grade_nat:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_carrier-grade_nat:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge_gateway:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge_gateway:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge_gateway:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_link_controller:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_link_controller:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_link_controller:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ssl_orchestrator:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ssl_orchestrator:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ssl_orchestrator:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_webaccelerator:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_webaccelerator:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_webaccelerator:16.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_websafe:14.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_websafe:15.1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_websafe:16.1.2:*:*:*:*:*:*:*

EPSS

Процентиль: 38%
0.0017
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-400
CWE-400

Связанные уязвимости

CVSS3: 5.3
github
больше 2 лет назад

When an SSL profile is configured on a Virtual Server, undisclosed traffic can cause an increase in CPU or SSL accelerator resource utilization.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

EPSS

Процентиль: 38%
0.0017
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-400
CWE-400