8.2
CVSSv3

CVE-2021-23012

Published: 10/05/2021 Updated: 24/05/2021
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.2 | Impact Score: 6 | Exploitability Score: 1.5
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

On BIG-IP versions 16.0.x prior to 16.0.1.1, 15.1.x prior to 15.1.3, 14.1.x prior to 14.1.4, and 13.1.x prior to 13.1.4, lack of input validation for items used in the system support functionality may allow users granted either "Resource Administrator" or "Administrator" roles to execute arbitrary bash commands on BIG-IP. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip access policy manager

f5 big-ip advanced firewall manager

f5 big-ip application acceleration manager

f5 big-ip analytics

f5 big-ip application security manager

f5 big-ip domain name system

f5 big-ip global traffic manager

f5 big-ip fraud protection service

f5 big-ip link controller

f5 big-ip advanced web application firewall

f5 big-ip ddos hybrid defender

f5 big-ip local traffic manager

f5 big-ip policy enforcement manager

f5 big-ip ssl orchestrator