Description
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Published: 2022-05-05
Score: 9.8 Critical
EPSS: 94.5% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Oct 2025 00:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Wed, 29 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-05-10'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

F5 Big-ip Access Policy Manager Big-ip Advanced Firewall Manager Big-ip Analytics Big-ip Application Acceleration Manager Big-ip Application Security Manager Big-ip Domain Name System Big-ip Fraud Protection Service Big-ip Global Traffic Manager Big-ip Link Controller Big-ip Local Traffic Manager Big-ip Policy Enforcement Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2025-10-21T23:15:40.370Z

Reserved: 2022-04-19T00:00:00.000Z

Link: CVE-2022-1388

cve-icon Vulnrichment

Updated: 2024-08-03T00:03:06.011Z

cve-icon NVD

Status : Analyzed

Published: 2022-05-05T17:15:10.570

Modified: 2025-10-27T17:06:48.893

Link: CVE-2022-1388

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses