Логотип exploitDog
bind:CVE-2022-41800
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-41800

Количество 3

Количество 3

nvd логотип

CVE-2022-41800

около 3 лет назад

In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 8.7
EPSS: Критический
github логотип

GHSA-cqcj-7vqr-p254

около 3 лет назад

In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 8.7
EPSS: Критический
fstec логотип

BDU:2022-06936

около 3 лет назад

Уязвимость интерфейса iControl REST средства контроля доступа и удаленной аутентификации BIG-IP, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 8.7
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-41800

In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 8.7
91%
Критический
около 3 лет назад
github логотип
GHSA-cqcj-7vqr-p254

In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 8.7
91%
Критический
около 3 лет назад
fstec логотип
BDU:2022-06936

Уязвимость интерфейса iControl REST средства контроля доступа и удаленной аутентификации BIG-IP, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 8.7
91%
Критический
около 3 лет назад

Уязвимостей на страницу