On 16.1.x versions prior to 16.1.2.2 and 15.1.x versions prior to 15.1.5.1, BIG-IP APM does not properly validate configurations, allowing an authenticated attacker with high privileges to manipulate the APM policy leading to privilege escalation/remote code execution. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Advisories
Source ID Title
EUVD EUVD EUVD-2022-32135 On 16.1.x versions prior to 16.1.2.2 and 15.1.x versions prior to 15.1.5.1, BIG-IP APM does not properly validate configurations, allowing an authenticated attacker with high privileges to manipulate the APM policy leading to privilege escalation/remote code execution. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2024-09-17T02:47:20.034Z

Reserved: 2022-04-19T00:00:00

Link: CVE-2022-27634

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-05T17:15:12.930

Modified: 2024-11-21T06:56:03.920

Link: CVE-2022-27634

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.