Language:
Severity: Critical
ID: 147626
File Name: f5_bigip_SOL03009991.nasl
Version: 1.14
Type: local
Published: 3/10/2021
Updated: 5/10/2024
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.5
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2021-22986
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_domain_name_system, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/h:f5:big-ip, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_application_acceleration_manager
Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/10/2021
Vulnerability Publication Date: 3/11/2021
CISA Known Exploited Vulnerability Due Dates: 11/17/2021
Core Impact
Metasploit (F5 iControl REST Unauthenticated SSRF Token Generation RCE)
CVE: CVE-2021-22986
IAVA: 2021-A-0127-S