F5

Big-ip

30 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 07.05.2025 22:15:19
  • Zuletzt bearbeitet 08.05.2025 14:39:09

When a BIG-IP HTTP/2 httprouter profile is configured on a virtual server, undisclosed responses can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.07%
  • Veröffentlicht 07.05.2025 22:15:19
  • Zuletzt bearbeitet 29.09.2025 21:30:36

When a BIG-IP PEM system is licensed with URL categorization, and the URL categorization policy or an iRule with the urlcat command is enabled on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. ...

Medienbericht
  • EPSS 0.07%
  • Veröffentlicht 07.05.2025 22:15:18
  • Zuletzt bearbeitet 08.05.2025 14:39:09

When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system com...

  • EPSS 0.19%
  • Veröffentlicht 05.02.2025 18:15:35
  • Zuletzt bearbeitet 08.08.2025 17:05:04

When BIG-IP Advanced WAF/ASM Behavioral DoS (BADoS) TLS Signatures feature is configured, undisclosed traffic can case an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not...

  • EPSS 0.19%
  • Veröffentlicht 05.02.2025 18:15:35
  • Zuletzt bearbeitet 06.08.2025 16:19:57

When URL categorization is configured on a virtual server, undisclosed requests can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.1%
  • Veröffentlicht 05.02.2025 18:15:34
  • Zuletzt bearbeitet 05.02.2025 18:15:34

A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user. This vulnerability is due to an incomplete f...

  • EPSS 0.15%
  • Veröffentlicht 05.02.2025 18:15:34
  • Zuletzt bearbeitet 05.02.2025 18:15:34

When BIG-IP AFM is provisioned with IPS module enabled and protocol inspection profile is configured on a virtual server or firewall rule or policy, undisclosed traffic can cause an increase in CPU resource utilization.   Note: Software versions whi...

  • EPSS 0.04%
  • Veröffentlicht 05.02.2025 18:15:32
  • Zuletzt bearbeitet 05.02.2025 18:15:32

An insufficient verification of data authenticity vulnerability exists in BIG-IP APM Access Policy endpoint inspection that may allow an attacker to bypass endpoint inspection checks for VPN connection initiated thru BIG-IP APM browser network access...

  • EPSS 0.15%
  • Veröffentlicht 05.02.2025 18:15:31
  • Zuletzt bearbeitet 05.02.2025 18:15:31

When BIG-IP APM Access Profile is configured on a virtual server, undisclosed request can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.43%
  • Veröffentlicht 05.02.2025 18:15:31
  • Zuletzt bearbeitet 06.08.2025 16:23:09

When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have...