CVE-2023-22283

On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:clients:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge:-:*:*:*:clients:windows:*:*

History

21 Nov 2024, 07:44

Type Values Removed Values Added
References () https://my.f5.com/manage/s/article/K07143733 - Vendor Advisory () https://my.f5.com/manage/s/article/K07143733 - Vendor Advisory

Information

Published : 2023-02-01 18:15

Updated : 2024-11-21 07:44


NVD link : CVE-2023-22283

Mitre link : CVE-2023-22283

CVE.ORG link : CVE-2023-22283


JSON object : View

Products Affected

f5

  • big-ip_access_policy_manager
  • big-ip_edge
CWE
CWE-427

Uncontrolled Search Path Element