CVE Vulnerabilities

CVE-2022-36795

Incorrect Calculation

Published: Oct 19, 2022 | Modified: Oct 21, 2022
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.7, and 14.1.x before 14.1.5.1, when an LTM TCP profile with Auto Receive Window Enabled is configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing new client connections.

Weakness

The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

Affected Software

Name Vendor Start Version End Version
Big-ip_access_policy_manager F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_access_policy_manager F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_access_policy_manager F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_access_policy_manager F5 17.0.0 (including) 17.0.0.1 (excluding)
Big-ip_advanced_firewall_manager F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_advanced_firewall_manager F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_advanced_firewall_manager F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_advanced_firewall_manager F5 17.0.0 (including) 17.0.0.1 (excluding)
Big-ip_analytics F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_analytics F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_analytics F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_analytics F5 17.0.0 (including) 17.0.0.1 (excluding)
Big-ip_application_acceleration_manager F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_application_acceleration_manager F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_application_acceleration_manager F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_application_acceleration_manager F5 17.0.0 (including) 17.0.0.1 (excluding)
Big-ip_application_security_manager F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_application_security_manager F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_application_security_manager F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_application_security_manager F5 17.0.0 (including) 17.0.0.1 (including)
Big-ip_domain_name_system F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_domain_name_system F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_domain_name_system F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_domain_name_system F5 17.0.0 (including) 17.0.0.1 (excluding)
Big-ip_fraud_protection_service F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_fraud_protection_service F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_fraud_protection_service F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_fraud_protection_service F5 17.0.0 (including) 17.0.0.1 (excluding)
Big-ip_global_traffic_manager F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_global_traffic_manager F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_global_traffic_manager F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_global_traffic_manager F5 17.0.0 (including) 17.0.0.1 (excluding)
Big-ip_link_controller F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_link_controller F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_link_controller F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_link_controller F5 17.0.0 (including) 17.0.0.1 (excluding)
Big-ip_local_traffic_manager F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_local_traffic_manager F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_local_traffic_manager F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_local_traffic_manager F5 17.0.0 (including) 17.0.0.1 (excluding)
Big-ip_policy_enforcement_manager F5 14.1.0 (including) 14.1.5.1 (excluding)
Big-ip_policy_enforcement_manager F5 15.1.0 (including) 15.1.7 (excluding)
Big-ip_policy_enforcement_manager F5 16.1.0 (including) 16.1.3.1 (excluding)
Big-ip_policy_enforcement_manager F5 17.0.0 (including) 17.0.0.1 (excluding)

Potential Mitigations

  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).
  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).

References