CVE-2022-26071 PUBLISHED CVSS 7.400000095367432 HIGH

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, a flaw in the way reply ICMP packets are limited in the Traffic Management Microkernel (TMM) allows an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

EPSS 1.48% · 80.8th percentile

Risk Scores

CVSS v3.1
7.400000095367432
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score
1.48%
80.8th percentile

Affected Products

VendorProductVersions
f5big-ip_application_acceleration_manager11.6.1, 17.0.0, 16.1.2
F5BIG-IP12.1.x, 11.6.x, 13.1.x
f5big-ip_access_policy_manager15.1.3, 15.1.2, 15.1.1
f5big-ip_local_traffic_manager11.6.1, 17.0.0, 16.1.2
f5big-ip_link_controller11.6.1, 11.6.2, 11.6.3
f5big-ip_application_security_manager15.1.5, 11.6.1, 11.6.2
f5big-ip_policy_enforcement_manager17.0.0, 11.6.1, 11.6.2
f5big-ip_analytics14.1.0, 11.6.1, 11.6.2
f5big-ip_domain_name_system17.0.0, 16.1.2, 16.1.1
f5big-ip_fraud_protection_service17.0.0, 16.1.2, 16.1.1
f5big-ip_global_traffic_manager17.0.0, 11.6.2, 11.6.3
f5big-ip_advanced_firewall_manager17.0.0, 16.1.2, 16.1.1

Timeline

References

…and 25 more

Open in Interactive Console →