In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://support.f5.com/csp/article/K13325942 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-03T12:56:38.173Z
Reserved: 2022-09-30T17:33:52.757Z
Link: CVE-2022-41800

No data.

Status : Modified
Published: 2022-12-07T04:15:10.480
Modified: 2024-11-21T07:23:52.013
Link: CVE-2022-41800

No data.