Unknown
CVE-2022-25946
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-25946
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker with Administrator role privilege may be able to bypass Appliance mode restrictions due to a missing integrity check in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- f5
Products
- big-ip access policy manager 13.1.0,
- big-ip access policy manager 13.1.1,
- big-ip access policy manager 13.1.3,
- big-ip access policy manager 13.1.4,
- big-ip access policy manager 13.1.5,
- big-ip access policy manager 14.1.0,
- big-ip access policy manager 14.1.2,
- big-ip access policy manager 14.1.3,
- big-ip access policy manager 14.1.4,
- big-ip access policy manager 15.1.0,
- big-ip access policy manager 15.1.1,
- big-ip access policy manager 15.1.2,
- big-ip access policy manager 15.1.3,
- big-ip access policy manager 15.1.4,
- big-ip access policy manager 15.1.5,
- big-ip access policy manager 16.1.0,
- big-ip access policy manager 16.1.1,
- big-ip access policy manager 16.1.2,
- big-ip advanced web application firewall 13.1.0,
- big-ip advanced web application firewall 13.1.1,
- big-ip advanced web application firewall 13.1.3,
- big-ip advanced web application firewall 13.1.4,
- big-ip advanced web application firewall 13.1.5,
- big-ip advanced web application firewall 14.1.0,
- big-ip advanced web application firewall 14.1.2,
- big-ip advanced web application firewall 14.1.3,
- big-ip advanced web application firewall 14.1.4,
- big-ip advanced web application firewall 15.1.0,
- big-ip advanced web application firewall 15.1.1,
- big-ip advanced web application firewall 15.1.2,
- big-ip advanced web application firewall 15.1.3,
- big-ip advanced web application firewall 15.1.4,
- big-ip advanced web application firewall 15.1.5,
- big-ip advanced web application firewall 16.1.0,
- big-ip advanced web application firewall 16.1.1,
- big-ip advanced web application firewall 16.1.2,
- big-ip application security manager 13.1.0,
- big-ip application security manager 13.1.1,
- big-ip application security manager 13.1.3,
- big-ip application security manager 13.1.4,
- big-ip application security manager 13.1.5,
- big-ip application security manager 14.1.0,
- big-ip application security manager 14.1.2,
- big-ip application security manager 14.1.3,
- big-ip application security manager 14.1.4,
- big-ip application security manager 15.1.0,
- big-ip application security manager 15.1.1,
- big-ip application security manager 15.1.2,
- big-ip application security manager 15.1.3,
- big-ip application security manager 15.1.4,
- big-ip application security manager 15.1.5,
- big-ip application security manager 16.1.0,
- big-ip application security manager 16.1.1,
- big-ip application security manager 16.1.2,
- big-ip guided configuration
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: