10
CVE-2020-5902
- EPSS 94.43%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 02.04.2025 18:28:41
- Quelle f5sirt@f5.com
- Teams Watchlist Login
- Unerledigt Login
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Access Policy Manager Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Access Policy Manager Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Access Policy Manager Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Access Policy Manager Version >= 15.0.0 <= 15.0.1.4
F5 ≫ Big-ip Access Policy Manager Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Advanced Firewall Manager Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Advanced Firewall Manager Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Advanced Firewall Manager Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Advanced Firewall Manager Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Advanced Firewall Manager Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Advanced Firewall Manager Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Analytics Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Analytics Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Analytics Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Analytics Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Analytics Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Analytics Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Application Acceleration Manager Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Application Acceleration Manager Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Application Acceleration Manager Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Application Acceleration Manager Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Application Acceleration Manager Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Application Acceleration Manager Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Application Security Manager Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Application Security Manager Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Application Security Manager Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Application Security Manager Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Application Security Manager Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Application Security Manager Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Domain Name System Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Domain Name System Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Domain Name System Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Domain Name System Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Domain Name System Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Domain Name System Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Fraud Protection Service Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Fraud Protection Service Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Fraud Protection Service Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Fraud Protection Service Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Fraud Protection Service Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Fraud Protection Service Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Global Traffic Manager Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Global Traffic Manager Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Global Traffic Manager Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Global Traffic Manager Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Global Traffic Manager Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Global Traffic Manager Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Link Controller Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Link Controller Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Link Controller Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Link Controller Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Link Controller Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Link Controller Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Local Traffic Manager Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Local Traffic Manager Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Local Traffic Manager Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Local Traffic Manager Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Local Traffic Manager Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Local Traffic Manager Version >= 15.1.0 < 15.1.0.4
F5 ≫ Big-ip Policy Enforcement Manager Version >= 11.6.1 < 11.6.5.2
F5 ≫ Big-ip Policy Enforcement Manager Version >= 12.1.0 < 12.1.5.2
F5 ≫ Big-ip Policy Enforcement Manager Version >= 13.1.0 < 13.1.3.4
F5 ≫ Big-ip Policy Enforcement Manager Version >= 14.1.0 < 14.1.2.6
F5 ≫ Big-ip Policy Enforcement Manager Version >= 15.0.0 < 15.0.1.4
F5 ≫ Big-ip Policy Enforcement Manager Version >= 15.1.0 < 15.1.0.4
F5 ≫ Ssl Orchestrator Version >= 11.6.1 < 11.6.5.2
F5 ≫ Ssl Orchestrator Version >= 12.1.0 < 12.1.5.2
F5 ≫ Ssl Orchestrator Version >= 13.1.0 < 13.1.3.4
F5 ≫ Ssl Orchestrator Version >= 14.1.0 < 14.1.2.6
F5 ≫ Ssl Orchestrator Version >= 15.0.0 < 15.0.1.4
F5 ≫ Ssl Orchestrator Version >= 15.1.0 < 15.1.0.4
03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog
F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability
SchwachstelleF5 BIG-IP Traffic Management User Interface (TMUI) contains a remote code execution vulnerability in undisclosed pages.
BeschreibungApply updates per vendor instructions.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 94.43% | 1 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.