CVE-2023-22374
high-risk
Published 2023-02-01
A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Do I need to act?
~
3.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.5/10
High
NETWORK
/ HIGH complexity
Affected Products (20)
Affected Vendors
References (2)
Vendor Advisory
https://my.f5.com/manage/s/article/K000130415
Vendor Advisory
https://my.f5.com/manage/s/article/K000130415
55
/ 100
high-risk
Severity
25/34 · High
Exploitability
7/34 · Low
Exposure
23/34 · High