Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-22993 : Security Advisory and Response

Learn about CVE-2021-22993 impacting BIG-IP Advanced WAF and BIG-IP ASM versions, leading to DOM-based XSS on the DoS Profile properties page. Take immediate steps to patch and secure your systems.

This CVE-2021-22993 affects BIG-IP Advanced WAF and BIG-IP ASM versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, leading to DOM-based XSS on the DoS Profile properties page.

Understanding CVE-2021-22993

This section delves into the details of the CVE-2021-22993 vulnerability in BIG-IP Advanced WAF and BIG-IP ASM.

What is CVE-2021-22993?

The vulnerability involves DOM-based XSS on the DoS Profile properties page in affected versions of BIG-IP Advanced WAF and BIG-IP ASM.

The Impact of CVE-2021-22993

Exploitation of this vulnerability could result in a cross-site scripting (XSS) attack, potentially allowing attackers to execute malicious scripts within the context of the affected site.

Technical Details of CVE-2021-22993

This section outlines the technical aspects of the CVE-2021-22993 vulnerability.

Vulnerability Description

The vulnerability exists in the handling of user input related to DoS Profile properties, leading to DOM-based XSS.

Affected Systems and Versions

BIG-IP Advanced WAF and BIG-IP ASM versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 are impacted.

Exploitation Mechanism

Attackers can exploit this vulnerability by injecting malicious scripts into the DoS Profile properties page, potentially leading to XSS attacks.

Mitigation and Prevention

This section provides guidance on mitigating and preventing exploitation of CVE-2021-22993.

Immediate Steps to Take

Users are advised to update to the patched versions (16.0.1.1, 15.1.2, 14.1.3.1, 13.1.3.6, or 12.1.5.3) to mitigate the vulnerability.

Long-Term Security Practices

Implement strict input validation mechanisms to prevent XSS attacks and regularly monitor for any unusual behavior.

Patching and Updates

F5 Networks has released patches for the affected versions to address the vulnerability and improve the security of BIG-IP Advanced WAF and BIG-IP ASM.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now