{"containers":{"cna":{"affected":[{"product":"BIG-IP","vendor":"F5","versions":[{"lessThan":"13.1.x*","status":"affected","version":"13.1.0","versionType":"custom"},{"lessThan":"14.1.5.1","status":"affected","version":"14.1.x","versionType":"custom"},{"lessThan":"15.1.6.1","status":"affected","version":"15.1.x","versionType":"custom"},{"lessThan":"16.1.3.1","status":"affected","version":"16.1.x","versionType":"custom"},{"lessThan":"17.0.0.1","status":"affected","version":"17.0.x","versionType":"custom"}]}],"datePublic":"2022-08-03T00:00:00.000Z","descriptions":[{"lang":"en","value":"In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, certain iRules commands may allow an attacker to bypass the access control restrictions for a self IP address, regardless of the port lockdown settings. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-269","description":"CWE-269 Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-08-04T17:46:48.000Z","orgId":"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab","shortName":"f5"},"references":[{"tags":["x_refsource_MISC"],"url":"https://support.f5.com/csp/article/K80970653"}],"source":{"discovery":"INTERNAL"},"title":"BIG-IP iRule vulnerability CVE-2022-33962","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"f5sirt@f5.com","DATE_PUBLIC":"2022-08-03T14:00:00.000Z","ID":"CVE-2022-33962","STATE":"PUBLIC","TITLE":"BIG-IP iRule vulnerability CVE-2022-33962"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"BIG-IP","version":{"version_data":[{"version_affected":">=","version_name":"13.1.x","version_value":"13.1.0"},{"version_affected":"<","version_name":"14.1.x","version_value":"14.1.5.1"},{"version_affected":"<","version_name":"15.1.x","version_value":"15.1.6.1"},{"version_affected":"<","version_name":"16.1.x","version_value":"16.1.3.1"},{"version_affected":"<","version_name":"17.0.x","version_value":"17.0.0.1"}]}}]},"vendor_name":"F5"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, certain iRules commands may allow an attacker to bypass the access control restrictions for a self IP address, regardless of the port lockdown settings. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-269 Improper Privilege Management"}]}]},"references":{"reference_data":[{"name":"https://support.f5.com/csp/article/K80970653","refsource":"MISC","url":"https://support.f5.com/csp/article/K80970653"}]},"source":{"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T08:16:15.909Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.f5.com/csp/article/K80970653"}]}]},"cveMetadata":{"assignerOrgId":"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab","assignerShortName":"f5","cveId":"CVE-2022-33962","datePublished":"2022-08-04T17:46:48.341Z","dateReserved":"2022-07-19T00:00:00.000Z","dateUpdated":"2024-09-17T00:36:38.654Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}