F5

BIG-IP

111 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 15.10.2025 15:19:46
  • Zuletzt bearbeitet 21.10.2025 12:12:43

When a BIG IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.28%
  • Veröffentlicht 15.10.2025 13:55:55
  • Zuletzt bearbeitet 27.01.2026 13:30:32

A directory traversal vulnerability exists in TMUI that allows a highly privileged authenticated attacker to access files which are not limited to the intended files.  Note: Software versions which have reached End of Technical Support (EoTS) are not...

  • EPSS 0.06%
  • Veröffentlicht 15.10.2025 13:55:55
  • Zuletzt bearbeitet 21.10.2025 19:35:20

A validation vulnerability exists in an undisclosed URL in the Configuration utility.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.09%
  • Veröffentlicht 15.10.2025 13:55:55
  • Zuletzt bearbeitet 21.10.2025 21:09:04

When a client SSL profile is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.06%
  • Veröffentlicht 15.10.2025 13:55:54
  • Zuletzt bearbeitet 04.02.2026 17:48:00

A vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with at least resource administrator role to execute arbitrary system commands with higher privileges.  A successful ...

  • EPSS 0.11%
  • Veröffentlicht 15.10.2025 13:55:54
  • Zuletzt bearbeitet 21.10.2025 21:05:37

When a per-request policy is configured on a BIG-IP APM portal access virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are...

  • EPSS 0.09%
  • Veröffentlicht 15.10.2025 13:55:53
  • Zuletzt bearbeitet 21.10.2025 19:52:08

When a BIG-IP APM OAuth access profile (Resource Server or Resource Client) is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) ar...

  • EPSS 0.06%
  • Veröffentlicht 15.10.2025 13:55:53
  • Zuletzt bearbeitet 04.02.2026 17:48:10

A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell.  For BIG-IP systems running in Appliance mode, a successfu...

Warnung Medienbericht
  • EPSS 7.45%
  • Veröffentlicht 15.10.2025 13:55:52
  • Zuletzt bearbeitet 31.03.2026 17:12:31

When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.09%
  • Veröffentlicht 15.10.2025 13:55:52
  • Zuletzt bearbeitet 21.10.2025 19:30:28

When the database variable tm.tcpudptxchecksum is configured as non-default value Software-only on a BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End o...