{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T06:00:47.620","vulnerabilities":[{"cve":{"id":"CVE-2022-23031","sourceIdentifier":"f5sirt@f5.com","published":"2022-01-25T20:15:10.007","lastModified":"2024-11-21T06:47:50.727","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"On BIG-IP FPS, ASM, and Advanced WAF versions 16.1.x before 16.1.1, 15.1.x before 15.1.4, and 14.1.x before 14.1.4.4, an XML External Entity (XXE) vulnerability exists in an undisclosed page of the F5 Advanced Web Application Firewall (Advanced WAF) and BIG-IP ASM Traffic Management User Interface (TMUI), also referred to as the Configuration utility, that allows an authenticated high-privileged attacker to read local files and force BIG-IP to send HTTP requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."},{"lang":"es","value":"En BIG-IP FPS, ASM y Advanced WAF versiones 16.1.x anteriores a 16.1.1, 15.1.x anteriores a 15.1.4 y 14.1.x anteriores a 14.1.4 4, se presenta una vulnerabilidad de tipo XML External Entity (XXE) en una página no revelada de la Interfaz de Usuario de Administración de Tráfico (TMUI) de F5 Advanced Web Application Firewall (Advanced WAF) y BIG-IP ASM, también denominada utilidad de configuración, que permite a un atacante autenticado con altos privilegios leer archivos locales y forzar a BIG-IP a enviar peticiones HTTP. Nota: Las versiones de software que han alcanzado el Fin de Soporte Técnico (EoTS) no son evaluadas"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"f5sirt@f5.com","type":"Secondary","description":[{"lang":"en","value":"CWE-611"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"D2A1BB14-BEB5-43DD-878D-83E51FBFD4E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"56D19CAF-676D-4029-91C4-80140C4C4416"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0.0","versionEndIncluding":"16.1.0","matchCriteriaId":"E37ABB6D-9AF7-4528-8727-FBDC2AEEFBB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"15EB0439-9C16-45C2-895D-44D6ED1A028A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"2408EED7-CFDF-414C-82DB-FA9541DE2138"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0.0","versionEndIncluding":"16.1.0","matchCriteriaId":"DF4F0388-DB5A-4D10-953F-09E5C111BFBC"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndIncluding":"14.1.4","matchCriteriaId":"DFD7DB4C-6CA7-4C26-81AB-1F9A27F4355A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"15.1.0","versionEndIncluding":"15.1.3","matchCriteriaId":"C956EAAD-0750-4E25-9A69-8B1DD156B6BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0.0","versionEndIncluding":"16.1.0","matchCriteriaId":"F63F91CB-DEEE-466A-A2D3-51688C438BCC"}]}]}],"references":[{"url":"https://support.f5.com/csp/article/K61112120","source":"f5sirt@f5.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://support.f5.com/csp/article/K61112120","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}