On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, and F5 BIG-IQ Centralized Management all versions of 8.x and 7.x, an authenticated, high-privileged attacker with no bash access may be able to access Certificate and Key files using Secure Copy (SCP) protocol from a remote system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
                
            References
                    | Link | Resource | 
|---|---|
| https://support.f5.com/csp/article/K38271531 | Vendor Advisory | 
| https://support.f5.com/csp/article/K38271531 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 06:53
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://support.f5.com/csp/article/K38271531Â - Vendor Advisory | 
Information
                Published : 2022-05-05 17:15
Updated : 2024-11-21 06:53
NVD link : CVE-2022-26340
Mitre link : CVE-2022-26340
CVE.ORG link : CVE-2022-26340
JSON object : View
Products Affected
                f5
- big-ip_fraud_protection_service
 - big-ip_local_traffic_manager
 - big-ip_application_security_manager
 - big-ip_domain_name_system
 - big-ip_policy_enforcement_manager
 - big-ip_application_acceleration_manager
 - big-ip_global_traffic_manager
 - big-ip_advanced_firewall_manager
 - big-ip_analytics
 - big-ip_access_policy_manager
 - big-ip_link_controller
 - big-iq_centralized_management
 
CWE
                
                    
                        
                        CWE-732
                        
            Incorrect Permission Assignment for Critical Resource
