Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26787 | On F5OS-A beginning in version 1.2.0 to before 1.3.0 and F5OS-C beginning in version 1.3.0 to before 1.5.0, processing F5OS tenant file names may allow for command injection. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K06345931 |
|
Wed, 26 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2025-03-26T17:49:38.336Z
Reserved: 2023-01-13T06:43:46.160Z
Link: CVE-2023-22657
Updated: 2024-08-02T10:13:49.910Z
Status : Modified
Published: 2023-02-01T18:15:11.600
Modified: 2024-11-21T07:45:08.870
Link: CVE-2023-22657
No data.
OpenCVE Enrichment
No data.
EUVD