F5

BIG-IP

111 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.41%
  • Veröffentlicht 05.02.2025 18:15:31
  • Zuletzt bearbeitet 06.08.2025 16:24:44

When BIG-IP PEM Control Plane listener Virtual Server is configured with Diameter Endpoint profile, undisclosed traffic can cause the Virtual Server to stop processing new client connections and an increase in memory resource utilization. Note: Softw...

  • EPSS 0.64%
  • Veröffentlicht 05.02.2025 18:15:31
  • Zuletzt bearbeitet 04.02.2026 17:47:11

When running in Appliance mode, and logged into a highly-privileged role, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundar...

  • EPSS 0.48%
  • Veröffentlicht 05.02.2025 18:15:31
  • Zuletzt bearbeitet 12.11.2025 14:36:53

When BIG-IP APM Access Profile is configured on a virtual server, undisclosed request can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.42%
  • Veröffentlicht 05.02.2025 18:15:30
  • Zuletzt bearbeitet 21.10.2025 11:40:40

When Client or Server SSL profiles are configured on a Virtual Server, or DNSSEC signing operations are in use, undisclosed traffic can cause an increase in memory and CPU resource utilization. Note: Software versions which have reached End of T...

  • EPSS 0.63%
  • Veröffentlicht 05.02.2025 18:15:30
  • Zuletzt bearbeitet 21.10.2025 11:40:28

When SNMP v1 or v2c are disabled on the BIG-IP, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

  • EPSS 66.18%
  • Veröffentlicht 05.02.2025 18:15:29
  • Zuletzt bearbeitet 21.10.2025 11:41:21

Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands. Note: Software versions which have reached End of Technical Suppor...

  • EPSS 0.56%
  • Veröffentlicht 05.02.2025 18:15:29
  • Zuletzt bearbeitet 21.10.2025 11:41:11

When SIP session Application Level Gateway mode (ALG) profile with Passthru Mode enabled and SIP router ALG profile are configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to ter...

  • EPSS 0.55%
  • Veröffentlicht 05.02.2025 18:15:29
  • Zuletzt bearbeitet 21.10.2025 11:40:49

When a BIG-IP message routing profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

  • EPSS 0.52%
  • Veröffentlicht 08.05.2024 15:15:10
  • Zuletzt bearbeitet 21.10.2025 11:38:35

A reflected cross-site scripting (XSS) vulnerability exist in undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which have reached ...

  • EPSS 0.31%
  • Veröffentlicht 08.05.2024 15:15:09
  • Zuletzt bearbeitet 21.10.2025 19:28:04

When an SSL profile with alert timeout is configured with a non-default value on a virtual server, undisclosed traffic along with conditions beyond the attacker's control can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Soft...