Show plain JSON{"id": "CVE-2021-23026", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2021-09-14T22:15:07.087", "references": [{"url": "https://support.f5.com/csp/article/K53854428", "tags": ["Mitigation", "Vendor Advisory"], "source": "f5sirt@f5.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}, {"type": "Secondary", "source": "f5sirt@f5.com", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "BIG-IP version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.4.2, 13.1.x before 13.1.4.1, and all versions of 12.1.x and 11.6.x and all versions of BIG-IQ 8.x, 7.x, and 6.x are vulnerable to cross-site request forgery (CSRF) attacks through iControl SOAP. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}, {"lang": "es", "value": "BIG-IP versiones 16.0.x anteriores a 16.0.1.2, versiones 15.1.x anteriores a 15.1.3, versiones 14.1.x anteriores a 14.1.4.2, versiones 13.1.x anteriores a 13.1.4.1 y todas las versiones de 12.1.x y la 11.6.x y todas las versiones de BIG-IQ 8.x, 7.x y 6.x son vulnerables a ataques de tipo cross-site request forgery (CSRF) mediante iControl SOAP. Nota: Las versiones de software que han alcanzado End of Technical Support (EoTS) no son evaluadas"}], "lastModified": "2021-09-29T19:21:42.590", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50288008-B90F-4882-80AD-2C70A1F1E2DD", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5286F92-3E35-4B00-AA8F-AC96449BD2F6", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EF8BF70-3688-4DEE-BF08-835293783996", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADA2E5BF-3710-46E7-89CC-2C5D8C39A612", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C37ABF73-E093-498B-99F3-11D5A3908C7F", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB20EE99-82A2-4FF9-B1C5-A0E40816AA5A", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DA90BE2-04DD-42C1-A2B0-9B2BC8201940", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7754026-7F57-4666-BF42-F1042EB1D69B", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4C23715-2E2A-4FC6-8303-007AA2355779", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2A1BB14-BEB5-43DD-878D-83E51FBFD4E0", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7EE1E34-5DAE-4162-93E7-F043E5DF67C8", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D3877DD-4285-4EA1-9E76-A7EF48B0B1B5", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18F2AC19-1085-48C3-B270-DD3E17A7870D", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CCAB1F6-9AD7-4743-A6B6-D42567427845", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BCA8AFF-F556-496D-9B37-2F3901001E88", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71C40185-3EFC-40DD-B7E4-160656AA3AF6", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDDC86D0-B9D6-42AE-959E-CC40C6F275EE", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B90B84E-0BAA-465E-A4D3-20902772B951", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B89D933-D3FE-4115-BBBD-26A6AE60C851", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7521AA83-43FA-40C2-8634-6BCB222039E4", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17DCE22-99F8-422C-A414-86CFA78BA425", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15EB0439-9C16-45C2-895D-44D6ED1A028A", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E60DDD42-73D2-44BE-B101-03E313E5C35C", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C19CC5B0-63A3-454E-B0F4-9F4A6D176567", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B2315AF-62CA-4948-AF3A-CC2D08F63BEF", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF0981E9-9826-4D59-9FF1-709208A88B0C", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F167B61-6851-4273-8043-02B37B0D2A7C", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5137A68D-E317-49B0-902A-E5C5168E9707", "versionEndIncluding": "16.0.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F82E9A35-A3E2-4915-BE23-B321C18BE6C3", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A27C0FAB-2C2F-4F5E-8EF4-CC4923B848F4", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60AF000D-91C4-424A-B0BD-D49BD8D55BBB", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6841D98-26B1-4569-9324-5A310B137A03", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B486BC4-2258-42FC-834E-22958ACFCA13", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFD7DB4C-6CA7-4C26-81AB-1F9A27F4355A", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3504522B-9264-46DE-98BD-227E9753DC1A", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A27DDB2-F747-4CAA-AB86-982E50ED9C6A", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FCEA7BA-FBAB-4D94-86D9-51B7F8E4C0A1", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC486854-8119-4DDC-BE29-AB3394D2A214", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35149ED3-F9F8-48C8-82E5-A250BA507F32", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "521B1C9E-8430-468F-9CAE-E58855875E45", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADE1E0A6-DE70-4D46-B493-671E23EEA32D", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5FF402E-8A6B-498F-BDB3-089EFAE55061", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "280A0D1B-BC02-405D-9CDA-5CE8A4D738C0", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "553DC114-AAE0-4FF4-BF54-CF5D11675E13", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "228F7E70-F93D-40BD-9C33-2A51CB6B931F", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D38D907A-2071-4675-8616-733E3C96C95B", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9776077-38E1-4D8E-8E2B-ADA28B1F568B", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8400E2BC-7527-4F70-9261-82B06EA6588A", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4574B7D-DFAF-4527-8E19-2E37650A1494", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30382C56-3299-4D9C-943B-46B8CECB31BF", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C20ED9D0-83EA-442F-B9CA-FC5B69C5E223", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C33A02C-DFAB-481A-AB73-D799CD477F9B", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D2210B0-898F-49A9-ABEC-55971978C2AA", "versionEndIncluding": "13.1.4", "versionStartIncluding": "13.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C4A0BD4-F4CE-43BD-A957-3812DD1DCE92", "versionEndIncluding": "14.1.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85B2BB16-7953-40ED-AB1C-B844B244C0F3", "versionEndIncluding": "15.1.2", "versionStartIncluding": "15.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E2ED4CD-551D-4A67-A8CB-311156D53E11", "versionEndIncluding": "16.0.1.1", "versionStartIncluding": "16.0.0"}, {"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F37D18F2-8C6A-4557-85DC-2A751595423C", "versionEndIncluding": "6.1.0", "versionStartIncluding": "6.0.0"}, {"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C88B0206-093A-4A18-8322-A1CD1D4ACF2A", "versionEndIncluding": "7.1.0", "versionStartIncluding": "7.0.0"}, {"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29AC093D-F3E9-4CA5-80E8-E41354BF4126", "versionEndIncluding": "8.1.0", "versionStartIncluding": "8.0.0"}], "operator": "OR"}]}], "sourceIdentifier": "f5sirt@f5.com"}