{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T18:43:38.071","vulnerabilities":[{"cve":{"id":"CVE-2023-22302","sourceIdentifier":"f5sirt@f5.com","published":"2023-02-01T18:15:10.820","lastModified":"2024-11-21T07:44:29.253","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In BIG-IP versions 17.0.x before 17.0.0.2, and 16.1.x beginning in 16.1.2.2 to before 16.1.3.3, when an HTTP profile is configured on a virtual server and conditions beyond the attacker’s control exist on the target pool member, undisclosed requests sent to the BIG-IP system can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n"}],"metrics":{"cvssMetricV31":[{"source":"f5sirt@f5.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"f5sirt@f5.com","type":"Secondary","description":[{"lang":"en","value":"CWE-772"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-772"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"3B18C60C-27E7-4258-83B9-6972562E788B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"E84986CC-EF54-4404-B559-3FF946C67BB0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"0C2BE12E-5276-4589-9233-8B34501650B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"4D73AB87-F4A4-47D5-A21E-BB1330454634"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"51E21925-F4CE-4205-A217-18E5BE0C75AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"A2E0F084-A550-40EC-A106-D869DDA96546"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"B76DADBB-44CE-4729-B2C6-092C339EC7F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"7E9D2DF2-F179-4F04-AB09-1BEAD56248A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"264B4CF6-E013-46E6-A6FA-58B7D8A4A26A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"FD5FB958-EDC9-4D39-AE1E-9E77FB5437B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"CE7B7358-8E75-4070-A426-8D883B25E384"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"33C4B785-93AC-4316-BDA1-D173520306E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"F09EA8D1-1230-44E0-8AD7-2EF57C335C80"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"93721140-2035-4431-BF5F-CA0C78BBFE53"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"63F2F61C-D9E2-4968-A854-FA802D96656F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"1FACDA44-7199-47C7-A0C6-1728B46CC6AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"065979A9-63DB-4DEB-A0A7-454733EFC45F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"1ED20421-3E21-40B8-B1FB-68F910F543F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"0941C38C-2BF4-4532-A4E2-4549823026A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"5FAB540A-6082-4F6E-9CDE-0AB719B1001F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"8A23C109-279D-4015-9EBD-47D54DDEA0D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"AE38066A-9FAF-46E6-B3F8-1473D64EE122"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"16.1.2.2","versionEndExcluding":"16.1.3.3","matchCriteriaId":"B9E33213-C376-4CFF-9156-80FDBC945ABC"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0","versionEndExcluding":"17.0.0.2","matchCriteriaId":"68A413B5-6809-4FB3-BAEC-5EF1FDF201B0"}]}]}],"references":[{"url":"https://my.f5.com/manage/s/article/K58550078","source":"f5sirt@f5.com","tags":["Vendor Advisory"]},{"url":"https://my.f5.com/manage/s/article/K58550078","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}