CVE-2022-1388 - Authentication flaw
Original CVE data
On F5 BIG-IP 16.1.x versions prior to 126.96.36.199, 15.1.x versions prior to 188.8.131.52, 14.1.x versions prior to 184.108.40.206, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
F5 - (11)
Common vulnerability metrics
Vulnerability weakness type is in the top 25 CWEs according to MITRE. View Mitre Top 25 CWEs
Exploits are available either through exploit packs, Github repos or the world wide web in general.
Vulnerability is referenced under CISA's Known Exploited Vulnerabilities (KEV) catalog. See the KEV Catalog
Vulnerability is mentioned or trending in social media.
Vulnerability is being actively exploited by threat actors during campaigns.
How the vulnerability maps against various cybersecurity frameworks
How the submited vulnerability affects compliance
Web Application Security Frameworks
Applicable if the issue likely affects a web application