Vulnerability Details CVE-2023-22302
In BIG-IP versions 17.0.x before 17.0.0.2, and 16.1.x beginning in 16.1.2.2 to before 16.1.3.3, when an HTTP profile is configured on a virtual server and conditions beyond the attacker’s control exist on the target pool member, undisclosed requests sent to the BIG-IP system can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 57.5%
CVSS Severity
CVSS v3 Score 5.9
Products affected by CVE-2023-22302
-
cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.2.2
-
cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.3
-
cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.3.1
-
cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.2.2
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.3
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.3.1
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.3.2
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0
-
cpe:2.3:a:f5:big-ip_analytics:16.1.2.2
-
cpe:2.3:a:f5:big-ip_analytics:16.1.3
-
cpe:2.3:a:f5:big-ip_analytics:16.1.3.1
-
cpe:2.3:a:f5:big-ip_analytics:17.0.0
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.2.2
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.3
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.3.1
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0
-
cpe:2.3:a:f5:big-ip_application_security_manager:16.1.2.2
-
cpe:2.3:a:f5:big-ip_application_security_manager:16.1.3
-
cpe:2.3:a:f5:big-ip_application_security_manager:16.1.3.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0
-
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:16.1.2.2
-
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:16.1.3
-
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:16.1.3.1
-
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.0.0
-
cpe:2.3:a:f5:big-ip_domain_name_system:16.1.2.2
-
cpe:2.3:a:f5:big-ip_domain_name_system:16.1.3
-
cpe:2.3:a:f5:big-ip_domain_name_system:16.1.3.1
-
cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.2.2
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.3
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.3.1
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0
-
cpe:2.3:a:f5:big-ip_link_controller:16.1.2.2
-
cpe:2.3:a:f5:big-ip_link_controller:16.1.3
-
cpe:2.3:a:f5:big-ip_link_controller:16.1.3.1
-
cpe:2.3:a:f5:big-ip_link_controller:17.0.0
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.2.2
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.3
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.3.1
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.2.2
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.3
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.3.1
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0
-
cpe:2.3:a:f5:big-ip_ssl_orchestrator:16.1.2.2
-
cpe:2.3:a:f5:big-ip_ssl_orchestrator:16.1.3
-
cpe:2.3:a:f5:big-ip_ssl_orchestrator:16.1.3.1
-
cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.0.0