VARIoT IoT vulnerabilities database
| VAR-202201-1946 | CVE-2022-23030 | plural F5 Networks Product resource exhaustion vulnerability |
CVSS V2: 4.3 CVSS V3: 5.3 Severity: MEDIUM |
On version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and all versions of 13.1.x, when the BIG-IP Virtual Edition (VE) uses the ixlv driver (which is used in SR-IOV mode and requires Intel X710/XL710/XXV710 family of network adapters on the Hypervisor) and TCP Segmentation Offload configuration is enabled, undisclosed requests may cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A resource management error vulnerability in F5 BIG-IP could allow an unauthenticated attacker to cause a degradation of service, resulting in a denial of service (DoS) on the BIG-IP system
| VAR-202201-1372 | CVE-2022-23027 | BIG-IP Improper Comparison Vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
On BIG-IP versions 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, 13.1.x beginning in 13.1.3.6, 12.1.5.3-12.1.6, and 11.6.5.2, when a FastL4 profile and an HTTP, FIX, and/or hash persistence profile are configured on the same virtual server, undisclosed requests can cause the virtual server to stop processing new client connections. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP contains an improper comparison vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has a configuration file vulnerability that can be exploited by an attacker to cause a denial of service on the BIG-IP system
| VAR-202201-1374 | CVE-2022-23023 | plural F5 Networks Product resource exhaustion vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
On BIG-IP version 16.1.x before 16.1.2.1, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all versions of 13.1.x and 12.1.x, and BIG-IQ all versions of 8.x and 7.x, undisclosed requests by an authenticated iControl REST user can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A resource management error vulnerability exists in F5 BIG-IP that could be exploited by an authenticated remote attacker to cause service degradation, resulting in a denial of service on the BIG-IP system
| VAR-202201-1948 | CVE-2022-23026 | BIG-IP ASM and Advanced WAF Vulnerability in unlimited upload of dangerous types of files in |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
On BIG-IP ASM & Advanced WAF version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and all versions of 13.1.x and 12.1.x, an authenticated user with low privileges, such as a guest, can upload data using an undisclosed REST endpoint causing an increase in disk resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP ASM and Advanced WAF Contains a vulnerability related to unlimited uploads of dangerous types of files.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to increase disk utilization and cause denial of service
| VAR-202201-1949 | CVE-2022-23025 | BIG-IP In NULL Pointer dereference vulnerability |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP version 16.1.x before 16.1.1, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, and all versions of 13.1.x, when a SIP ALG profile is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has a code issue vulnerability that can be exploited by an attacker to cause a denial of service on the BIG-IP system
| VAR-202201-1950 | CVE-2022-23021 | plural F5 Networks In the product NULL Pointer dereference vulnerability |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP version 16.1.x before 16.1.2, when any of the following configurations are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate: HTTP redirect rule in an LTM policy, BIG-IP APM Access Profile, and Explicit HTTP Proxy in HTTP Profile. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has a code issue vulnerability that can be exploited by an attacker to cause a denial of service on the BIG-IP system
| VAR-202201-1319 | CVE-2022-23010 | plural F5 Networks Product Improper Shutdown and Release of Resources Vulnerability |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP versions 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, when a FastL4 profile and an HTTP profile are configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks A resource improper shutdown and release vulnerability exists in the product.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5
| VAR-202201-1311 | CVE-2021-40042 | plural Huawei Invalid Pointer and Free Reference Vulnerabilities in Products |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
There is a release of invalid pointer vulnerability in some Huawei products, successful exploit may cause the process and service abnormal. Affected product versions include: CloudEngine 12800 V200R019C10SPC800, V200R019C10SPC900; CloudEngine 5800 V200R019C10SPC800, V200R020C00SPC600; CloudEngine 6800 versions V200R019C10SPC800, V200R019C10SPC900, V200R020C00SPC600, V300R020C00SPC200; CloudEngine 7800 V200R019C10SPC800. plural Huawei The product contains an invalid pointer and reference freeing vulnerability.Service operation interruption (DoS) It may be in a state. Huawei CloudEngine 12800, etc. are all products of China's Huawei (Huawei). Huawei CloudEngine 12800 is a 12800 series data center switch. Huawei Cloudengine 5800 is a 5800 series data center switch.
A buffer overflow vulnerability exists in many Huawei products. The vulnerability is caused by insufficient validation of certain parameters in the message
| VAR-202201-1963 | CVE-2022-23032 | BIG-IP APM Same-origin policy violation vulnerability in the system |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
In all versions before 7.2.1.4, when proxy settings are configured in the network access resource of a BIG-IP APM system, connecting BIG-IP Edge Client on Mac and Windows is vulnerable to a DNS rebinding attack. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP APM The system is vulnerable to same origin policy violation.Information may be obtained
| VAR-202201-1346 | CVE-2022-23019 | plural BIG-IP Product input verification vulnerabilities |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x and 12.1.x, when a message routing type virtual server is configured with both Diameter Session and Router Profiles, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural BIG-IP The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has an input validation error vulnerability, which can be exploited by attackers to cause a denial of service
| VAR-202201-1318 | CVE-2021-40033 | plural Huawei Product vulnerabilities |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
There is an information exposure vulnerability on several Huawei Products. The vulnerability is due to that the software does not properly protect certain information. Successful exploit could cause information disclosure. Affected product versions include: CloudEngine 12800 V200R005C10SPC800; CloudEngine 5800 V200R005C10SPC800, V200R019C00SPC800; CloudEngine 6800 V200R005C10SPC800, V200R005C20SPC800, V200R019C00SPC800; CloudEngine 7800 V200R005C10SPC800, V200R019C00SPC800. plural Huawei There are unspecified vulnerabilities in the product.Information may be obtained. Huawei CloudEngine 12800, etc. are all products of China's Huawei (Huawei). Huawei CloudEngine 12800 is a 12800 series data center switch. Huawei Cloudengine 5800 is a 5800 series data center switch. Huawei Cloudengine 6800 is a 6800 series data center switch
| VAR-202201-1369 | CVE-2021-36348 | iDRAC9 Injection vulnerability in |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
iDRAC9 versions prior to 5.00.20.00 contain an input injection vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to cause information disclosure or denial of service by supplying specially crafted input data to iDRAC. iDRAC9 There is an injection vulnerability in.Information is obtained and service operation is interrupted (DoS) It may be in a state. Dell Emc Idrac is a kind of hardware located on the server motherboard from Dell (Dell). For system administrators to update and manage Dell systems.
Dell EMC iDRAC has a security vulnerability that could allow an unauthenticated remote attacker to deny access to the iDRAC web server
| VAR-202201-1941 | CVE-2021-42810 | SafeNet Agent for Remote Desktop Gateway In PRNG Improper Use of Seeds Vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A flaw in the previous versions of the product may allow an authenticated attacker the ability to execute code as a privileged user on a system where the agent is installed. SafeNet Agent for Remote Desktop Gateway for, PRNG A vulnerability exists related to improper use of seeds in .Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Thales Group Thales Sentinel Protection Installer is an integrated installer of the French company Thales Group
| VAR-202201-1960 | CVE-2022-23020 | plural F5 Networks In the product NULL Pointer dereference vulnerability |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP version 16.1.x before 16.1.2, when the 'Respond on Error' setting is enabled on the Request Logging profile and configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
| VAR-202201-1368 | CVE-2021-36346 | Dell iDRAC8 Vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Dell iDRAC 8 prior to version 2.82.82.82 contain a denial of service vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to deny access to the iDRAC webserver. Dell iDRAC8 Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Dell EMC iDRAC is a kind of hardware located on the server motherboard from Dell (Dell). For system administrators to update and manage Dell systems.
A denial-of-service vulnerability in Dell EMC iDRAC stems from improper handling of input error messages, which could be exploited by a remote, high-privileged attacker to control process execution and gain access to the iDRAC operating system
| VAR-202201-1962 | CVE-2022-23018 | BIG-IP AFM Vulnerability in handling exceptional conditions in |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP AFM version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and 13.1.x beginning in 13.1.3.4, when a virtual server is configured with both HTTP protocol security and HTTP Proxy Connect profiles, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP AFM Exists in a vulnerability in handling exceptional conditions.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a security vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
| VAR-202201-1961 | CVE-2022-23013 | BIG-IP DNS and GTM Cross-site scripting vulnerability in |
CVSS V2: 4.3 CVSS V3: 8.8 Severity: HIGH |
On BIG-IP DNS & GTM version 16.x before 16.1.0, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, a DOM-based cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP DNS and GTM Exists in a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management
| VAR-202201-1959 | CVE-2022-23031 | plural F5 Networks In the product XML External entity vulnerabilities |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
On BIG-IP FPS, ASM, and Advanced WAF versions 16.1.x before 16.1.1, 15.1.x before 15.1.4, and 14.1.x before 14.1.4.4, an XML External Entity (XXE) vulnerability exists in an undisclosed page of the F5 Advanced Web Application Firewall (Advanced WAF) and BIG-IP ASM Traffic Management User Interface (TMUI), also referred to as the Configuration utility, that allows an authenticated high-privileged attacker to read local files and force BIG-IP to send HTTP requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP FPS , ASM , Advanced WAF for, XML There is a vulnerability in an external entity.Information may be obtained. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management
| VAR-202201-1344 | CVE-2022-23014 | BIG-IP APM Input validation vulnerability in portal |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
On versions 16.1.x before 16.1.2 and 15.1.x before 15.1.4.1, when BIG-IP APM portal access is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP APM Portal contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates network traffic orchestration, load balancing, intelligent DNS, remote access policy management and other functions.
The F5 BIG-IP APM input validation error vulnerability could be exploited by an attacker to cause a denial of service
| VAR-202201-1944 | CVE-2022-23024 | BIG-IP AFM Resource exhaustion vulnerability in |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP AFM version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.2, and all versions of 13.1.x, when the IPsec application layer gateway (ALG) logging profile is configured on an IPsec ALG virtual server, undisclosed IPsec traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP AFM Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. The F5 BIG-IP AFM has a resource management error vulnerability that could be exploited by an attacker to cause a denial of service on the BIG-IP system