CVE-2022-25946

HIGH

F5 BIG-IP Advanced WAF, ASM, and GC <9.0 - Auth Bypass

Title source: llm
STIX 2.1

Description

On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker with Administrator role privilege may be able to bypass Appliance mode restrictions due to a missing integrity check in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Scores

CVSS v3 8.7
EPSS 0.0013
EPSS Percentile 32.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Details

CWE
CWE-354
Status published
Products (50)
f5/big-ip_access_policy_manager 13.1.0
f5/big-ip_access_policy_manager 13.1.1
f5/big-ip_access_policy_manager 13.1.3
f5/big-ip_access_policy_manager 13.1.4
f5/big-ip_access_policy_manager 13.1.5
f5/big-ip_access_policy_manager 14.1.0
f5/big-ip_access_policy_manager 14.1.2
f5/big-ip_access_policy_manager 14.1.3
f5/big-ip_access_policy_manager 14.1.4
f5/big-ip_access_policy_manager 15.1.0
... and 40 more
Published May 05, 2022
Tracked Since Feb 18, 2026