8.7
CVE-2026-40067
- EPSS 0.07%
- Veröffentlicht 13.05.2026 14:12:30
- Zuletzt bearbeitet 13.05.2026 16:27:11
- Quelle f5sirt@f5.com
- CVE-Watchlists
- Unerledigt
BIG-IP APM Vulnerability
When a BIG-IP APM access policy is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerF5
≫
Produkt
BIG-IP
Default Statusunknown
Version
21.1.0
Version <
*
Status
unaffected
Version
21.0.0
Version <
21.0.0.1
Status
affected
Version
17.5.0
Version <
17.5.1.4
Status
affected
Version
17.1.0
Version <
17.1.3.1
Status
affected
Version
16.1.0
Version <
*
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.218 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| f5sirt@f5.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
| f5sirt@f5.com | 8.7 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.