In BIG-IP Versions 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, Traffic Intelligence feeds, which use HTTPS, do not verify the remote endpoint identity, allowing for potential data poisoning. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K25046752 | Vendor Advisory |
https://support.f5.com/csp/article/K25046752 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.f5.com/csp/article/K25046752 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
Information
Published : 2022-08-04 18:15
Updated : 2024-11-21 07:10
NVD link : CVE-2022-34865
Mitre link : CVE-2022-34865
CVE.ORG link : CVE-2022-34865
JSON object : View
Products Affected
f5
- big-ip_global_traffic_manager
- big-ip_advanced_firewall_manager
- big-ip_link_controller
- big-ip_domain_name_system
- big-ip_access_policy_manager
- big-ip_local_traffic_manager
- big-ip_fraud_protection_service
- big-ip_analytics
- big-ip_application_security_manager
- big-ip_application_acceleration_manager
- big-ip_policy_enforcement_manager
CWE
CWE-295
Improper Certificate Validation