Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2023-38419 is a medium severity vulnerability with a CVSS score of 4.3. No known exploits currently, and patches are available.
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
An authenticated attacker with guest privileges or higher can cause the iControl SOAP process to terminate by sending undisclosed requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| Vendor | Product |
|---|---|
| F5 | Big IP Link Controller |
| F5 | Big IP Carrier Grade Nat |
| F5 | Big IP Analytics |
| F5 | Big IP Access Policy Manager |
| F5 | Big IP Domain Name System |
| F5 | Big IP Advanced Web Application Firewall |
| F5 | Big IP Ddos Hybrid Defender |
| F5 | Big IP Policy Enforcement Manager |
| F5 | Big IP Fraud Protection Service |
| F5 | Big IP Global Traffic Manager |
And 10 more...