F5

Big-ip Access Policy Manager

538 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warning Media report Exploit
  • EPSS 94.44%
  • Published 10.10.2023 14:15:10
  • Last modified 11.06.2025 17:29:54

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 0.11%
  • Published 10.10.2023 13:15:22
  • Last modified 21.11.2024 08:26:34

Exposure of Sensitive Information vulnerability exist in an undisclosed BIG-IP TMOS shell (tmsh) command which may allow an authenticated attacker with resource administrator role privileges to view sensitive information.   Note: Software versions ...

  • EPSS 0.17%
  • Published 10.10.2023 13:15:22
  • Last modified 21.11.2024 08:41:47

An insufficient verification of data vulnerability exists in BIG-IP Edge Client Installer on macOS that may allow an attacker elevation of privileges during the installation process.  Note: Software versions which have reached End of Technical Supp...

  • EPSS 0.58%
  • Published 10.10.2023 13:15:21
  • Last modified 21.11.2024 08:20:32

When IPSec is configured on a Virtual Server, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 2.64%
  • Published 10.10.2023 13:15:21
  • Last modified 21.11.2024 08:21:10

A directory traversal vulnerability exists in the BIG-IP Configuration Utility that may allow an authenticated attacker to execute commands on the BIG-IP system. For BIG-IP system running in Appliance mode, a successful exploit can allow the attacke...

  • EPSS 0.2%
  • Published 10.10.2023 13:15:21
  • Last modified 21.11.2024 08:22:00

The BIG-IP and BIG-IQ systems do not encrypt some sensitive information written to Database (DB) variables.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.43%
  • Published 10.10.2023 13:15:21
  • Last modified 21.11.2024 08:23:07

When a non-admin user has been assigned an administrator role via an iControl REST PUT request and later the user's role is reverted back to a non-admin role via the Configuration utility, tmsh, or iControl REST. BIG-IP non-admin user can still have...

  • EPSS 0.23%
  • Published 10.10.2023 13:15:21
  • Last modified 21.11.2024 08:24:08

When TACACS+ audit forwarding is configured on BIG-IP or BIG-IQ system, sharedsecret is logged in plaintext in the audit log.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.11%
  • Published 10.10.2023 13:15:21
  • Last modified 21.11.2024 08:24:27

The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process.  This vulnerability is due to an incomplete fix for CVE-2023-38418.  Note: Software versions which have reached End of...

  • EPSS 0.06%
  • Published 10.10.2023 13:15:21
  • Last modified 21.11.2024 08:24:42

When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing BIG-IP external monitor on a BIG-IP system.  A successful exploit can allow the attacker to cross a se...