F5 BIG-IP 安全漏洞(CVE-2023-22422)

CVE编号

CVE-2023-22422

利用情况

暂无

补丁情况

N/A

披露时间

2023-02-02
漏洞描述
F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。
F5 BIG-IP 存在安全漏洞,该漏洞源于当在虚拟服务器上配置具有非默认强制执行选项 Enforce RFC Compliance和Unknown Methods: Reject的 HTTP 配置文件时,未公开的请求可能导致Traffic Management Microkernel (TMM) 终止,以下产品和版本受到影响:BIG-IP (AFM) 17.0.0、16.1.0 到16.1.3版本。
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_ddos_hybrid_defender * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_ddos_hybrid_defender * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
运行在以下环境
应用 f5 big-ip_ssl_orchestrator * From
(including)
16.1.0
Up to
(excluding)
16.1.3.3
运行在以下环境
应用 f5 big-ip_ssl_orchestrator * From
(including)
17.0.0
Up to
(excluding)
17.0.0.2
CVSS3评分
7.5
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-120 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
阿里云安全产品覆盖情况