F5

BIG-IP

111 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 13.05.2026 14:12:43
  • Zuletzt bearbeitet 13.05.2026 16:27:11

When a SIP profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.41%
  • Veröffentlicht 13.05.2026 14:12:42
  • Zuletzt bearbeitet 13.05.2026 16:27:11

When running in Appliance mode, a directory traversal vulnerability exists in an undisclosed iControl REST endpoint that may allow an authenticated attacker with administrator role privileges to cross a security boundary and delete files.  Note: Soft...

  • EPSS 0.07%
  • Veröffentlicht 13.05.2026 14:12:42
  • Zuletzt bearbeitet 13.05.2026 16:27:11

When a BIG-IP DNS profile enabled with DNS cache is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are n...

  • EPSS 0.03%
  • Veröffentlicht 13.05.2026 14:12:42
  • Zuletzt bearbeitet 13.05.2026 16:27:11

When running in Appliance mode, an authenticated attacker assigned the 'Administrator' role may be able to bypass Appliance mode restrictions on a BIG-IP system.  Note: Software versions which have reached End of Technical Support (EoTS) are not eva...

  • EPSS 0.04%
  • Veröffentlicht 13.05.2026 14:12:41
  • Zuletzt bearbeitet 13.05.2026 16:27:11

Incorrect permission assignment vulnerabilities exist in BIG-IP and BIG-IQ TMOS Shell (tmsh) network diagnostics commands and in BIG-IP iControl REST. These vulnerabilities may allow an authenticated attacker to view the network status of destination...

  • EPSS 0.03%
  • Veröffentlicht 13.05.2026 14:12:41
  • Zuletzt bearbeitet 13.05.2026 16:27:11

A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running arbitrary commands.     Note: Software versions which...

  • EPSS 0.03%
  • Veröffentlicht 13.05.2026 14:12:40
  • Zuletzt bearbeitet 13.05.2026 16:27:11

A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running arbitrary commands.  Note: Software versions which ha...

  • EPSS 0.04%
  • Veröffentlicht 13.05.2026 14:12:40
  • Zuletzt bearbeitet 13.05.2026 16:27:11

An authenticated attacker's undisclosed requests to BIG-IP iControl REST can lead to an information leak of BIG-IP local user account names.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.04%
  • Veröffentlicht 13.05.2026 14:12:40
  • Zuletzt bearbeitet 13.05.2026 16:27:11

Incorrect permission assignment vulnerabilities exist in BIG-IP and BIG-IQ TMOS Shell (tmsh) arp and ndp commands, and in BIG-IP iControl REST. These vulnerabilities may allow an authenticated attacker to view adjacent network information.  Note: ...

  • EPSS 0.05%
  • Veröffentlicht 13.05.2026 14:12:39
  • Zuletzt bearbeitet 13.05.2026 16:27:11

A vulnerability exists in BIG-IP scripted monitors that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system commands with higher privileges. In appliance mode deployments, a successful...