F5

Big-ip Access Policy Manager

538 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 31.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:34

In some situations on BIG-IP APM 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, or 11.6.0-11.6.3.2, the CRLDP Auth access policy agent may treat revoked certificates as valid when the BIG-IP APM system fails to download a new Certificate Revocati...

  • EPSS 0.28%
  • Veröffentlicht 31.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:34

In BIG-IP 14.0.0-14.0.0.2 or 13.0.0-13.1.1.1 or Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allo...

  • EPSS 0.26%
  • Veröffentlicht 19.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:32

On F5 BIG-IP 13.0.0-13.1.1.1 and 12.1.0-12.1.3.6, a reflected Cross-Site Scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an authenticated user to execute JavaScript for the currently logged-...

  • EPSS 0.26%
  • Veröffentlicht 19.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:32

On F5 BIG-IP 13.0.0-13.1.1.1 and 12.1.0-12.1.3.6, there is a reflected Cross Site Scripting (XSS) vulnerability in an undisclosed Configuration Utility page.

  • EPSS 0.14%
  • Veröffentlicht 19.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:32

In F5 BIG-IP APM 13.0.0-13.1.1.1, APM Client 7.1.5-7.1.6, and/or Edge Client 7101-7160, the BIG-IP APM Edge Client component loads the policy library with user permission and bypassing the endpoint checks.

  • EPSS 3.53%
  • Veröffentlicht 10.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:31

When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not...

  • EPSS 0.65%
  • Veröffentlicht 08.10.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 02:58:04

Under some circumstances on BIG-IP 12.0.0-12.1.0, 11.6.0-11.6.1, or 11.4.0-11.5.4 HF1, the Traffic Management Microkernel (TMM) may not properly clean-up pool member network connections when using SPDY or HTTP/2 virtual server profiles.

  • EPSS 0.28%
  • Veröffentlicht 13.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:31

A vulnerability in BIG-IP APM portal access 11.5.1-11.5.7, 11.6.0-11.6.3, and 12.1.0-12.1.3 discloses the BIG-IP software version in rewritten pages.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 13.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:02

On BIG-IP APM 11.6.0-11.6.3, an insecure AES ECB mode is used for orig_uri parameter in an undisclosed /vdesk link of APM virtual server configured with an access profile, allowing a malicious user to build a redirect URI value using different blocks...

  • EPSS 0.75%
  • Veröffentlicht 13.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:03

On BIG-IP APM 11.6.0-11.6.3.1, 12.1.0-12.1.3.3, 13.0.0, and 13.1.0-13.1.0.3, APMD may core when processing SAML Assertion or response containing certain elements.