- Description
- When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
- Source
- f5sirt@f5.com
- NVD status
- Analyzed
- Products
- big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_advanced_web_application_firewall, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_application_visibility_and_reporting, big-ip_automation_toolchain, big-ip_carrier-grade_nat, big-ip_container_ingress_services, big-ip_ddos_hybrid_defender, big-ip_domain_name_system, big-ip_edge_gateway, big-ip_fraud_protection_service, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_ssl_orchestrator, big-ip_webaccelerator, big-ip_websafe
CVSS 4.0
- Type
- Secondary
- Base score
- 8.5
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
CVSS 3.1
- Type
- Secondary
- Base score
- 8.7
- Impact score
- 5.8
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
- Severity
- HIGH
- f5sirt@f5.com
- CWE-77
- Hype score
- Not currently trending
CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP https://t.co/hULIOF9bwT
@momika233
14 May 2025
4580 Impressions
18 Retweets
79 Likes
19 Bookmarks
1 Reply
0 Quotes
🚀🔒 @F5 BIG-IP: 𝙲𝚘𝚖𝚖𝚊𝚗𝚍 𝙸𝚗𝚓𝚎𝚌𝚝𝚒𝚘𝚗 𝚅𝚞𝚕𝚗𝚎𝚛𝚊𝚋𝚒𝚕𝚒𝚝𝚢 #cyber_security_highlights 💡 𝙾𝚟𝚎𝚛𝚟𝚒𝚎𝚠: F5 Networks has disclosed a critical command-injection flaw (CVE-2025-
@MahRabie
13 May 2025
31 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
F5 Networks a divulgué une vulnérabilité d'injection de commande de haute sévérité (CVE-2025-31644) dans ses produits BIG-IP fonctionnant en mode Appliance, permettant aux attaquants de contourner les restrictions de sécurité de ce dernier. https://t.co/x88IE2EVmw
@cert_ist
13 May 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-31644: Command Injection' in F5 BIG-IP, 8.7 rating❗️ Vuln in the "file" param of the "save" command allows authenticated attackers to execute arbitrary commands. Search at https://t.co/hv7QKSqxTR: 👉 Link: https://t.co/CgBDCmOaT9 #cybersecurity #vulnerability_ma
@Netlas_io
13 May 2025
70 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
⚠️⚠️ CVE-2025-31644 Exploit Grants Root Access on F5 BIG-IP via Appliance Mode Command Injection 🔥PoC: https://t.co/CYVqpmjLj7 🎯2.7m+ Results are found on the https://t.co/pb16tGYaKe nearly year. 🔗FOFA Link:https://t.co/pTLpgAh0HY FOFA Query:app="f5-BIGIP" https:
@fofabot
13 May 2025
1862 Impressions
6 Retweets
18 Likes
8 Bookmarks
0 Replies
0 Quotes
Inyección de comandos en modo Appliance en F5 BIG-IP CVE-2025-31644 https://t.co/pwgiP5KY3p https://t.co/MO80AUqZC9
@elhackernet
13 May 2025
1979 Impressions
4 Retweets
11 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub - mbadanoiu/CVE-2025-31644: CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP - https://t.co/IVxKcRrXCD
@piedpiper1616
13 May 2025
2211 Impressions
19 Retweets
46 Likes
17 Bookmarks
0 Replies
0 Quotes
PoC Released: CVE-2025-31644 Exploit Grants Root Access on F5 BIG-IP via Appliance Mode Command Injection https://t.co/Vvh3GaO4nW
@Dinosn
13 May 2025
9901 Impressions
52 Retweets
148 Likes
44 Bookmarks
2 Replies
2 Quotes
⚡️The vulnerability details are now available: https://t.co/s0v5FNvZWi 🚨🚨CVE-2025-31644 (CVSS 8.7) exposes a serious exploit for F5 BIG-IP! Authenticated admins can exploit a command injection flaw in Appliance Mode to gain ROOT ACCESS and cross security boundaries.
@zoomeye_team
13 May 2025
1253 Impressions
7 Retweets
18 Likes
8 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨 CVE-2025-31644 : Appliance mode BIG-IP iControl REST and tmsh vulnerability 🔥PoC : https://t.co/yY4dk64OYw 🧐Learn More: https://t.co/AAPG04LEGf 📊3.2M+ Services are found on the https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/x7B0YPZ6Wf 👇Quer
@HunterMapping
13 May 2025
5000 Impressions
43 Retweets
95 Likes
36 Bookmarks
0 Replies
1 Quote
F5のBIG-IPシステム(Applianceモード)に深刻な脆弱性が発見された(CVE-2025-31644)。iControl REST APIおよびTMSH CLIを通じて管理者が任意のbashコマンドを実行し、root権限を取得できる可能性がある。
@yousukezan
13 May 2025
612 Impressions
0 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
PoC Released: CVE-2025-31644 Exploit Grants Root Access on F5 BIG-IP via Appliance Mode Command Injection https://t.co/vLFee5JcrG
@the_yellow_fall
13 May 2025
1494 Impressions
11 Retweets
25 Likes
8 Bookmarks
0 Replies
1 Quote
⚠️Vulnerabilidades identificadas en productos de F5 ❗CVE-2025-46265 ❗CVE-2025-31644 ❗CVE-2025-36546 ➡️Más info: https://t.co/qE4ixwva7b https://t.co/TgbB3oAUuw
@CERTpy
12 May 2025
217 Impressions
2 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-31644 🔴 HIGH (8.7) 🏢 F5 - BIG-IP 🏗️ 17.5.0 🔗 https://t.co/dAvIccDWsE #CyberCron #VulnAlert #InfoSec https://t.co/CEjya4quVp
@cybercronai
8 May 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90F95346-79C4-47DF-B32F-E271483B15DD",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A20AA9F1-12A2-41BC-907A-E3BCFA7EA3CE",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A32A8D1-51DA-4809-A40E-485D1A3165BD",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76F07A61-62B9-479B-9292-CE2D381CF8BA",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF26442-8624-4BAE-9BA0-6261A48ECA3E",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5758E02E-B667-4C28-8470-422CD6B0B85E",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "666ADDDB-A0C1-4647-B5BA-0352B6259EB0",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEEBBE61-4525-414C-9425-1B2FB25FF9A4",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D713946-31BB-40EC-8E65-7FC41B95A676",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6DC3F0E-043C-4F2F-9E86-47B9AFFF27EF",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF9A7584-3423-4A3F-B95B-8186DD0E0376",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30D804D3-B5AA-49F8-A41C-636CB1C6C408",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56DD991A-A748-4AAF-B611-AA3530C8E577",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F5FBC1A-FDFB-4056-9D31-8156CF159643",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E08457C8-FC30-4C7B-8CB3-034DEFE1BD96",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E23F45D6-F85C-482E-B202-07582E625189",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8603239-5BAB-4B68-A9AD-7B91B3493F1E",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12B753F7-FC67-4FBA-A903-7F475804577D",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A98F9CC-8D1D-47AC-812B-45C6174D8493",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C33F8DDF-1238-4079-A770-EDFBCF42F5F3",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC902698-630D-4ECC-AE88-3D2017C79072",
"versionEndExcluding": "15.1.10.7",
"versionStartIncluding": "15.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "304BAC5F-38E2-4629-A4B5-43F2F1AB9CB9",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "859A0BFC-CD50-4482-967F-5816F8480B8F",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB936160-C10D-4556-B5AF-C1BA12C38673",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7A2C91-A997-4F82-A5C3-5F9943B1B6FC",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E80DD1F-0A18-4536-B501-7B1740A49C68",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B760A6-59A8-46E1-9CA1-23FA27982705",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B105CC45-1A86-435D-A56F-AD664DA50F50",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CF5250B-484E-45CC-89B4-9459300DC6AE",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "050656BF-3203-4C95-BF15-C3D1A1A494DD",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3891240B-CB4D-4E2B-AE63-6BF22F3F4B4B",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6CDB335-7BA3-4BC8-B47A-CC46C5922449",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE02E41-858F-4A18-9878-B9EA7D760470",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E7215503-77B5-4D6B-8AB8-950B74A53AC6",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C191C32D-0788-4405-B484-331260ADDAD1",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A7AF326-9537-480E-B9AF-E217638D7239",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24009DF3-E5AE-42C8-8452-64839C4ED1E5",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7CA0D19-0DB0-4EEE-95D6-21E71E1583DB",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39889DFE-E0C9-46B6-B4FD-EEB38AB3A2A4",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD0333F-74B6-4438-BE6B-7B35304F8065",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74D5E3BC-68DB-4190-80AC-526F788483C9",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9024C0-1CD3-4D21-B57E-953525E37A22",
"versionEndExcluding": "16.1.6",
"versionStartIncluding": "16.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82CB65BA-537C-4D9B-B13B-2BDD09F341F3",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19319242-7A85-4FFF-AD8F-08BEE84CA86F",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2E4A77-3825-4678-8E35-466E5C799ECF",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "369E542B-7A37-4C8F-9B84-1A01237915AC",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "735CE14F-E69F-4EBE-B5CC-20A7465A92FD",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F118E82-BDA3-4DB6-8133-F5D9919CDAF3",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "855D5E18-2BD4-47FB-AD46-688159A254C5",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAD38915-4D18-47C4-B217-43B966F21676",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD47B7A9-34D7-4853-9DF3-7CB3ABCC4033",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DCDFCD9-CB18-449D-8DC3-1F6FD9DE977F",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "471B3260-70CD-4A9D-9017-C3DD311BB86E",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "078F13E4-20AC-45A1-9759-67450F1E0FC0",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "322D2910-E25D-408B-B72E-2796D597340D",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEAA3B-59FD-4FDC-9039-542D19B26648",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4DC393-D404-4F6C-B551-759558510719",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75492B9E-FC4D-47CD-8523-DA0103956C72",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "038EC267-7992-4A9B-8A25-DABB152C51B8",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E93A5C2-5E03-4D09-BA51-EC353CBCDCCC",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31882F94-D9C4-43F1-ACEE-57AD042459DA",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B182998B-1A34-4339-966B-16341DE9D752",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5CB7038-304C-4332-B079-7C23FC73BD20",
"versionEndExcluding": "17.1.2.2",
"versionStartIncluding": "17.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]