VARIoT IoT vulnerabilities database
| VAR-202201-1947 | CVE-2022-23017 | plural F5 Networks In the product NULL Pointer dereference vulnerability |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and all versions of 13.1.x, when a virtual server is configured with a DNS profile with the Rapid Response Mode setting enabled and is configured on a BIG-IP system, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
| VAR-202201-1949 | CVE-2022-23025 | BIG-IP In NULL Pointer dereference vulnerability |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP version 16.1.x before 16.1.1, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, and all versions of 13.1.x, when a SIP ALG profile is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has a code issue vulnerability that can be exploited by an attacker to cause a denial of service on the BIG-IP system
| VAR-202201-1344 | CVE-2022-23014 | BIG-IP APM Input validation vulnerability in portal |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
On versions 16.1.x before 16.1.2 and 15.1.x before 15.1.4.1, when BIG-IP APM portal access is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP APM Portal contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates network traffic orchestration, load balancing, intelligent DNS, remote access policy management and other functions.
The F5 BIG-IP APM input validation error vulnerability could be exploited by an attacker to cause a denial of service
| VAR-202201-1950 | CVE-2022-23021 | plural F5 Networks In the product NULL Pointer dereference vulnerability |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP version 16.1.x before 16.1.2, when any of the following configurations are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate: HTTP redirect rule in an LTM policy, BIG-IP APM Access Profile, and Explicit HTTP Proxy in HTTP Profile. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has a code issue vulnerability that can be exploited by an attacker to cause a denial of service on the BIG-IP system
| VAR-202201-1319 | CVE-2022-23010 | plural F5 Networks Product Improper Shutdown and Release of Resources Vulnerability |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP versions 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, when a FastL4 profile and an HTTP profile are configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks A resource improper shutdown and release vulnerability exists in the product.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5
| VAR-202201-1311 | CVE-2021-40042 | plural Huawei Invalid Pointer and Free Reference Vulnerabilities in Products |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
There is a release of invalid pointer vulnerability in some Huawei products, successful exploit may cause the process and service abnormal. Affected product versions include: CloudEngine 12800 V200R019C10SPC800, V200R019C10SPC900; CloudEngine 5800 V200R019C10SPC800, V200R020C00SPC600; CloudEngine 6800 versions V200R019C10SPC800, V200R019C10SPC900, V200R020C00SPC600, V300R020C00SPC200; CloudEngine 7800 V200R019C10SPC800. plural Huawei The product contains an invalid pointer and reference freeing vulnerability.Service operation interruption (DoS) It may be in a state. Huawei CloudEngine 12800, etc. are all products of China's Huawei (Huawei). Huawei CloudEngine 12800 is a 12800 series data center switch. Huawei Cloudengine 5800 is a 5800 series data center switch.
A buffer overflow vulnerability exists in many Huawei products. The vulnerability is caused by insufficient validation of certain parameters in the message
| VAR-202201-1964 | CVE-2022-23029 | plural F5 Networks In the product Time-of-check Time-of-use (TOCTOU) Race condition vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
On BIG-IP version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, when a FastL4 profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has Time-of-check Time-of-use (TOCTOU) There is a race condition vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A configuration file vulnerability exists in F5 BIG-IP FastL4 that could be exploited by an unauthenticated remote attacker to cause service degradation, resulting in a denial of service (DoS) on the BIG-IP system
| VAR-202201-1369 | CVE-2021-36348 | iDRAC9 Injection vulnerability in |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
iDRAC9 versions prior to 5.00.20.00 contain an input injection vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to cause information disclosure or denial of service by supplying specially crafted input data to iDRAC. iDRAC9 There is an injection vulnerability in.Information is obtained and service operation is interrupted (DoS) It may be in a state. Dell Emc Idrac is a kind of hardware located on the server motherboard from Dell (Dell). For system administrators to update and manage Dell systems.
Dell EMC iDRAC has a security vulnerability that could allow an unauthenticated remote attacker to deny access to the iDRAC web server
| VAR-202201-1962 | CVE-2022-23018 | BIG-IP AFM Vulnerability in handling exceptional conditions in |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP AFM version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and 13.1.x beginning in 13.1.3.4, when a virtual server is configured with both HTTP protocol security and HTTP Proxy Connect profiles, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP AFM Exists in a vulnerability in handling exceptional conditions.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a security vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
| VAR-202201-1960 | CVE-2022-23020 | plural F5 Networks In the product NULL Pointer dereference vulnerability |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP version 16.1.x before 16.1.2, when the 'Respond on Error' setting is enabled on the Request Logging profile and configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
| VAR-202201-1346 | CVE-2022-23019 | plural BIG-IP Product input verification vulnerabilities |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x and 12.1.x, when a message routing type virtual server is configured with both Diameter Session and Router Profiles, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural BIG-IP The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP has an input validation error vulnerability, which can be exploited by attackers to cause a denial of service
| VAR-202201-1959 | CVE-2022-23031 | plural F5 Networks In the product XML External entity vulnerabilities |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
On BIG-IP FPS, ASM, and Advanced WAF versions 16.1.x before 16.1.1, 15.1.x before 15.1.4, and 14.1.x before 14.1.4.4, an XML External Entity (XXE) vulnerability exists in an undisclosed page of the F5 Advanced Web Application Firewall (Advanced WAF) and BIG-IP ASM Traffic Management User Interface (TMUI), also referred to as the Configuration utility, that allows an authenticated high-privileged attacker to read local files and force BIG-IP to send HTTP requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP FPS , ASM , Advanced WAF for, XML There is a vulnerability in an external entity.Information may be obtained. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management
| VAR-202201-1961 | CVE-2022-23013 | BIG-IP DNS and GTM Cross-site scripting vulnerability in |
CVSS V2: 4.3 CVSS V3: 8.8 Severity: HIGH |
On BIG-IP DNS & GTM version 16.x before 16.1.0, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, a DOM-based cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP DNS and GTM Exists in a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management
| VAR-202201-1948 | CVE-2022-23026 | BIG-IP ASM and Advanced WAF Vulnerability in unlimited upload of dangerous types of files in |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
On BIG-IP ASM & Advanced WAF version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and all versions of 13.1.x and 12.1.x, an authenticated user with low privileges, such as a guest, can upload data using an undisclosed REST endpoint causing an increase in disk resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP ASM and Advanced WAF Contains a vulnerability related to unlimited uploads of dangerous types of files.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to increase disk utilization and cause denial of service
| VAR-202201-1345 | CVE-2022-23028 | BIG-IP AFM calculation error vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.3 Severity: MEDIUM |
On BIG-IP AFM version 16.x before 16.1.0, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all versions of 13.1.x, when global AFM SYN cookie protection (TCP Half Open flood vector) is activated in the AFM Device Dos or DOS profile, certain types of TCP connections will fail. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP AFM contains a computational error vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. F5 BIG-IP AFM has a security vulnerability that could be exploited by an attacker to cause a denial of service on the BIG-IP system
| VAR-202201-1368 | CVE-2021-36346 | Dell iDRAC8 Vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Dell iDRAC 8 prior to version 2.82.82.82 contain a denial of service vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to deny access to the iDRAC webserver. Dell iDRAC8 Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Dell EMC iDRAC is a kind of hardware located on the server motherboard from Dell (Dell). For system administrators to update and manage Dell systems.
A denial-of-service vulnerability in Dell EMC iDRAC stems from improper handling of input error messages, which could be exploited by a remote, high-privileged attacker to control process execution and gain access to the iDRAC operating system
| VAR-202201-1371 | CVE-2022-23016 | plural F5 Networks In the product NULL Pointer dereference vulnerability |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
On versions 16.1.x before 16.1.2 and 15.1.x before 15.1.4.1, when BIG-IP SSL Forward Proxy with TLS 1.3 is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. There is a code problem vulnerability in F5 BIG-IP, which can be exploited by attackers to cause a denial of service
| VAR-202201-1944 | CVE-2022-23024 | BIG-IP AFM Resource exhaustion vulnerability in |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP AFM version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.2, and all versions of 13.1.x, when the IPsec application layer gateway (ALG) logging profile is configured on an IPsec ALG virtual server, undisclosed IPsec traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP AFM Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. The F5 BIG-IP AFM has a resource management error vulnerability that could be exploited by an attacker to cause a denial of service on the BIG-IP system
| VAR-202201-1941 | CVE-2021-42810 | SafeNet Agent for Remote Desktop Gateway In PRNG Improper Use of Seeds Vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A flaw in the previous versions of the product may allow an authenticated attacker the ability to execute code as a privileged user on a system where the agent is installed. SafeNet Agent for Remote Desktop Gateway for, PRNG A vulnerability exists related to improper use of seeds in .Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Thales Group Thales Sentinel Protection Installer is an integrated installer of the French company Thales Group
| VAR-202201-1374 | CVE-2022-23023 | plural F5 Networks Product resource exhaustion vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
On BIG-IP version 16.1.x before 16.1.2.1, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all versions of 13.1.x and 12.1.x, and BIG-IQ all versions of 8.x and 7.x, undisclosed requests by an authenticated iControl REST user can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks The product contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform of F5 that integrates functions such as network traffic orchestration, load balancing, intelligent DNS, and remote access policy management. A resource management error vulnerability exists in F5 BIG-IP that could be exploited by an authenticated remote attacker to cause service degradation, resulting in a denial of service on the BIG-IP system