In BIG-IP Versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, an authenticated attacker with Resource Administrator or Manager privileges can create or modify existing monitor objects in the Configuration utility in an undisclosed manner leading to a privilege escalation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://support.f5.com/csp/article/K13213418 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: f5
Published: 2022-08-04T17:50:06.202273Z
Updated: 2024-09-17T01:47:08.345Z
Reserved: 2022-07-19T00:00:00
Link: CVE-2022-35735
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-08-04T18:15:10.953
Modified: 2024-11-21T07:11:34.377
Link: CVE-2022-35735
Redhat
No data.