{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T17:21:12.465","vulnerabilities":[{"cve":{"id":"CVE-2022-23027","sourceIdentifier":"f5sirt@f5.com","published":"2022-01-25T20:15:09.827","lastModified":"2024-11-21T06:47:50.147","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"On BIG-IP versions 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, 13.1.x beginning in 13.1.3.6, 12.1.5.3-12.1.6, and 11.6.5.2, when a FastL4 profile and an HTTP, FIX, and/or hash persistence profile are configured on the same virtual server, undisclosed requests can cause the virtual server to stop processing new client connections. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."},{"lang":"es","value":"En BIG-IP versiones  15.1.x anteriores a 15.1.4, 14.1.x anteriores a 14.1.4.4, 13.1.x a partir de la 13.1.3.6, 12.1.5.3-12.1.6 y 11.6.5.2, cuando un perfil FastL4 y un perfil HTTP, FIX y/o de persistencia de hash están configurados en el mismo servidor virtual, las peticiones no reveladas pueden causar que el servidor virtual deje de procesar nuevas conexiones de clientes. Nota: Las versiones de software que han alcanzado el Fin de Soporte Técnico (EoTS) no son evaluadas"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"f5sirt@f5.com","type":"Secondary","description":[{"lang":"en","value":"CWE-697"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-697"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"599B3348-D47D-4312-BDA5-3940155ED0A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"0C82D191-CC08-4CD3-93A1-B61A2EC38A2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"D5286F92-3E35-4B00-AA8F-AC96449BD2F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"FE0AA66D-D6EF-4D7E-B975-9CF1A19AF279"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"B5FA3948-CFF0-4998-B1C0-A11B85AA64D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"CA438134-2EF8-48DB-89FC-018213A455A2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"AB20EE99-82A2-4FF9-B1C5-A0E40816AA5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"7C23AD78-B214-48C7-996C-F3BD2DE30B3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"6F356309-6EB1-4944-B636-B1EF46F57F21"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"29773DAE-63FE-41F9-A37F-FEAFCC7D2F45"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"D2A1BB14-BEB5-43DD-878D-83E51FBFD4E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"56D19CAF-676D-4029-91C4-80140C4C4416"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"E3759A08-1F9A-4AB1-8E2E-6E17BBD4686F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"4F669E8E-3A9B-464F-AE69-D2B1E9192FA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"6CCAB1F6-9AD7-4743-A6B6-D42567427845"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"51E8CE17-224C-45C8-845D-32A90559F35C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"49CFC4E6-7FED-4958-A59D-23D855F28CCF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"BED4BA49-481F-472D-B53B-A46DB837151D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"6B90B84E-0BAA-465E-A4D3-20902772B951"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"9C7C7515-D182-40C6-9224-B0C9A92F94BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"72A36D6A-DD3B-4E71-85A3-504C7A007D32"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"B9AECFA7-F9E1-4C45-B15F-32D731C2A20F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"15EB0439-9C16-45C2-895D-44D6ED1A028A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"2408EED7-CFDF-414C-82DB-FA9541DE2138"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"9A0CABE6-B18F-4C10-840F-FDAC2B664427"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"80733516-2501-44A7-BEEF-E6A752124F9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"EF0981E9-9826-4D59-9FF1-709208A88B0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"2A062EB3-9A75-4D74-B9F8-AE27F401C2CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"B628312A-A3BD-428A-86B9-7F89F68AF0D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"569C1E11-54A6-433F-AAA1-89EE0A7A4E3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"A27C0FAB-2C2F-4F5E-8EF4-CC4923B848F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"D3EB0C5A-FC0E-46A6-A59A-01B2091E8C84"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"0939F1AB-0978-4B01-93DD-891318D247DB"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"DFF00B17-4689-4425-AA2A-AF37A87D8077"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"DFD7DB4C-6CA7-4C26-81AB-1F9A27F4355A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"C956EAAD-0750-4E25-9A69-8B1DD156B6BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"061BF584-A0E1-4D68-97FC-C6FFDB238B8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"B218606C-EAA1-41B1-8E18-97DE386DC2AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"FC486854-8119-4DDC-BE29-AB3394D2A214"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"30EEE0A7-D601-43A5-80A7-44D637D6847F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"F1F898C3-8AE5-4363-A3E3-DFC9F5027209"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"3F3E7671-17C5-44EC-AEE8-F40AFDE4F78C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"C5FF402E-8A6B-498F-BDB3-089EFAE55061"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"A3D935FC-8637-44B1-B836-EBDA4AB22961"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"3CE19F5F-EB9E-40FF-9F77-0561150E3275"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"4FC608B5-F8DB-4750-9C3C-7BE2AF3253DB"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"D38D907A-2071-4675-8616-733E3C96C95B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"55AE6626-80D5-4B90-B579-34D3EB34EF3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"2BCC3936-C599-480E-BDF5-365C699B0373"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"5D19C7BB-255E-4C4C-878D-4A04563EF2D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"30382C56-3299-4D9C-943B-46B8CECB31BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"265F5361-DC0B-4AB2-ACD3-6F32680881C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.5.3","versionEndIncluding":"12.1.6","matchCriteriaId":"354066FA-BA8C-40DD-BEC1-D75464AEFC7A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.3.6","versionEndIncluding":"13.1.4","matchCriteriaId":"7502F1BD-873B-4515-895F-A1C9489337DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"0C4A0BD4-F4CE-43BD-A957-3812DD1DCE92"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"2E573320-1B7B-462F-8447-113C5CDE7472"}]}]}],"references":[{"url":"https://support.f5.com/csp/article/K30573026","source":"f5sirt@f5.com","tags":["Vendor Advisory"]},{"url":"https://support.f5.com/csp/article/K30573026","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}