On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, the BIG-IP Edge Client Component Installer Service does not use best practice while saving temporary files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
                
            References
                    | Link | Resource | 
|---|---|
| https://support.f5.com/csp/article/K33552735 | Vendor Advisory | 
| https://support.f5.com/csp/article/K33552735 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 06:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://support.f5.com/csp/article/K33552735 - Vendor Advisory | 
12 May 2022, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.4:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.3:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:* cpe:2.3:a:f5:access_policy_manager_clients:7.1.9.7:*:*:*:*:*:*:* cpe:2.3:a:f5:access_policy_manager_clients:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.3:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.3:*:*:*:*:*:*:* cpe:2.3:a:f5:access_policy_manager_clients:7.1.8:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.3:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.4:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.4:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0:*:*:*:*:*:*:* cpe:2.3:a:f5:access_policy_manager_clients:7.1.9.8:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.4:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.4:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:* cpe:2.3:a:f5:access_policy_manager_clients:7.1.9:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.2:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.5:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.5:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.3:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:* cpe:2.3:a:f5:access_policy_manager_clients:7.1.8.5:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.6:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2:*:*:*:*:*:*:* cpe:2.3:a:f5:access_policy_manager_clients:7.2.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.2:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.2:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.5:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.2:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.1:*:*:*:*:*:*:* | |
| References | (MISC) https://support.f5.com/csp/article/K33552735 - Vendor Advisory | |
| CVSS | v2 : v3 : | v2 : 4.6 v3 : 7.8 | 
05 May 2022, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-05-05 17:15
Updated : 2024-11-21 06:58
NVD link : CVE-2022-29263
Mitre link : CVE-2022-29263
CVE.ORG link : CVE-2022-29263
JSON object : View
Products Affected
                f5
- access_policy_manager_clients
- big-ip_access_policy_manager
CWE
                
                    
                        
                        CWE-732
                        
            Incorrect Permission Assignment for Critical Resource
