NA

CVE-2022-35728

Published: 04/08/2022 Updated: 10/08/2022
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In BIG-IP Versions 17.0.x prior to 17.0.0.1, 16.1.x prior to 16.1.3.1, 15.1.x prior to 15.1.6.1, 14.1.x prior to 14.1.5.1, and all versions of 13.1.x, and BIG-IQ version 8.x prior to 8.2.0 and all versions of 7.x, an authenticated user's iControl REST token may remain valid for a limited time after logging out from the Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-iq centralized management 7.0.0

f5 big-iq centralized management 8.0.0

f5 big-ip advanced firewall manager 17.0.0

f5 big-ip access policy manager 17.0.0

f5 big-ip analytics 17.0.0

f5 big-ip application security manager 17.0.0

f5 big-ip application acceleration manager 17.0.0

f5 big-ip policy enforcement manager 17.0.0

f5 big-ip local traffic manager 17.0.0

f5 big-ip analytics

f5 big-ip link controller

f5 big-ip local traffic manager

f5 big-ip policy enforcement manager

f5 big-ip link controller 17.0.0

f5 big-ip global traffic manager 17.0.0

f5 big-ip fraud protection service 17.0.0

f5 big-ip domain name system 17.0.0

f5 big-iq centralized management 8.1.0

f5 big-iq centralized management 7.1.0

f5 big-ip access policy manager

f5 big-ip advanced firewall manager

f5 big-ip application acceleration manager

f5 big-ip application security manager

f5 big-ip domain name system

f5 big-ip fraud protection service

f5 big-ip global traffic manager