CVE-2022-41983

CVSS V2 None CVSS V3 Low 3.7
Description
On specific hardware platforms, on BIG-IP versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.7, 14.1.x before 14.1.5.1, and all versions of 13.1.x, while Intel QAT (QuickAssist Technology) and the AES-GCM/CCM cipher is in use, undisclosed conditions can cause BIG-IP to send data unencrypted even with an SSL Profile applied.
Overview
  • CVE ID
  • CVE-2022-41983
  • Assigner
  • f5sirt@f5.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-10-19T22:15:13
  • Last Modified Date
  • 2022-10-24T15:57:26
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.6
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* 1 OR 13.1.0 13.1.5
cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* 1 OR 14.1.0 14.1.5.1
cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* 1 OR 15.1.0 15.1.7
cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* 1 OR 16.1.0 16.1.3.1
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 3.7
  • Base Severity
  • LOW
  • Exploitability Score
  • 2.2
  • Impact Score
  • 1.4
References
Reference URL Reference Tags
https://support.f5.com/csp/article/K31523465
History
Created Old Value New Value Data Type Notes
2022-10-19 23:00:05 Added to TrackCVE
2022-12-07 10:22:34 2022-10-19T22:15Z 2022-10-19T22:15:13 CVE Published Date updated
2022-12-07 10:22:34 2022-10-24T15:57:26 CVE Modified Date updated
2022-12-07 10:22:34 Analyzed Vulnerability Status updated