Description
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker with Administrator role privilege may be able to bypass Appliance mode restrictions due to a missing integrity check in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-30521 | On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker with Administrator role privilege may be able to bypass Appliance mode restrictions due to a missing integrity check in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K52322100 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-09-17T03:28:41.853Z
Reserved: 2022-04-19T00:00:00.000Z
Link: CVE-2022-25946
No data.
Status : Modified
Published: 2022-05-05T17:15:11.017
Modified: 2024-11-21T06:53:15.250
Link: CVE-2022-25946
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD