Description
On 16.1.x versions prior to 16.1.2.2 and 15.1.x versions prior to 15.1.5.1, BIG-IP APM does not properly validate configurations, allowing an authenticated attacker with high privileges to manipulate the APM policy leading to privilege escalation/remote code execution. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-32135 | On 16.1.x versions prior to 16.1.2.2 and 15.1.x versions prior to 15.1.5.1, BIG-IP APM does not properly validate configurations, allowing an authenticated attacker with high privileges to manipulate the APM policy leading to privilege escalation/remote code execution. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K57555833 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-09-17T02:47:20.034Z
Reserved: 2022-04-19T00:00:00.000Z
Link: CVE-2022-27634
No data.
Status : Modified
Published: 2022-05-05T17:15:12.930
Modified: 2024-11-21T06:56:03.920
Link: CVE-2022-27634
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD