F5

F5os-c

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 15.10.2025 15:19:50
  • Zuletzt bearbeitet 21.10.2025 19:20:56

A vulnerability exists in F5OS-A and F5OS-C system that may allow an authenticated attacker with local access to escalate their privileges.  A successful exploit may allow the attacker to cross a security boundary.  Note: Software versions which have...

  • EPSS 0.03%
  • Veröffentlicht 15.10.2025 13:55:56
  • Zuletzt bearbeitet 22.10.2025 21:05:38

An out-of-bounds write vulnerability exists in F5OS-A and F5OS-C that could lead to memory corruption.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.05%
  • Veröffentlicht 15.10.2025 13:55:53
  • Zuletzt bearbeitet 21.10.2025 20:35:08

A vulnerability exists in F5OS-A and F5OS-C systems that may allow an authenticated attacker with local access to escalate their privileges.  A successful exploit may allow the attacker to cross a security boundary.  Note: Software versions which hav...

  • EPSS 0.11%
  • Veröffentlicht 15.10.2025 13:55:49
  • Zuletzt bearbeitet 22.10.2025 21:01:54

When the Allowed IP Addresses feature is configured on the F5OS-C partition control plane, undisclosed traffic can cause multiple containers to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated...

  • EPSS 0.1%
  • Veröffentlicht 15.10.2025 13:55:46
  • Zuletzt bearbeitet 21.10.2025 18:53:23

When SNMP is configured on F5OS Appliance and Chassis systems, undisclosed requests can cause an increase in SNMP memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Medienbericht
  • EPSS 0.09%
  • Veröffentlicht 07.05.2025 22:15:21
  • Zuletzt bearbeitet 21.10.2025 18:01:47

On F5OS, an improper authorization vulnerability exists where remotely authenticated users (LDAP, RADIUS, TACACS+) may be authorized with higher privilege F5OS roles. Note: Software versions which have reached End of Technical Support (EoTS) are not ...

  • EPSS 0.04%
  • Veröffentlicht 07.05.2025 22:15:20
  • Zuletzt bearbeitet 07.11.2025 16:54:44

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note:...

Medienbericht
  • EPSS 0.09%
  • Veröffentlicht 07.05.2025 22:15:19
  • Zuletzt bearbeitet 21.10.2025 18:42:57

On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulne...

  • EPSS 0.26%
  • Veröffentlicht 14.02.2024 17:15:15
  • Zuletzt bearbeitet 24.01.2025 16:03:35

When LDAP remote authentication is configured on F5OS, a remote user without an assigned role will be incorrectly authorized.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.17%
  • Veröffentlicht 14.02.2024 17:15:13
  • Zuletzt bearbeitet 24.01.2025 16:03:56

A directory traversal vulnerability exists in the F5OS QKView utility that allows an authenticated attacker to read files outside the QKView directory.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.