F5

Big-ip Advanced Firewall Manager

514 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.48%
  • Veröffentlicht 08.05.2024 15:15:08
  • Zuletzt bearbeitet 21.10.2025 19:28:16

A DOM-based cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which have reac...

  • EPSS 0.02%
  • Veröffentlicht 14.02.2024 17:15:14
  • Zuletzt bearbeitet 05.09.2025 15:51:32

When running in Appliance mode, an authenticated attacker assigned the Administrator role may be able to bypass Appliance mode restrictions utilizing iAppsLX templates on a BIG-IP system.  Note: Software versions which have reached End of Technical S...

  • EPSS 0.2%
  • Veröffentlicht 14.02.2024 17:15:14
  • Zuletzt bearbeitet 23.01.2025 19:53:16

When SSL Client Certificate LDAP or Certificate Revocation List Distribution Point (CRLDP) authentication profile is configured on a virtual server, undisclosed requests can cause an increase in CPU resource utilization. Note: Software version...

  • EPSS 0.36%
  • Veröffentlicht 14.02.2024 17:15:14
  • Zuletzt bearbeitet 23.01.2025 19:53:31

When a virtual server is enabled with VLAN group and SNAT listener is configured, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not...

  • EPSS 0.27%
  • Veröffentlicht 14.02.2024 17:15:13
  • Zuletzt bearbeitet 23.01.2025 19:52:38

When HTTP/2 is configured on BIG-IP or BIG-IP Next SPK systems, undisclosed responses can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

  • EPSS 0.07%
  • Veröffentlicht 14.02.2024 17:15:12
  • Zuletzt bearbeitet 23.01.2025 19:47:50

BIG-IP or BIG-IQ Resource Administrators and Certificate Managers who have access to the secure copy (scp) utility but do not have access to Advanced shell (bash) can execute arbitrary commands with a specially crafted command string. This vulnerabil...

  • EPSS 0.32%
  • Veröffentlicht 14.02.2024 17:15:12
  • Zuletzt bearbeitet 05.09.2025 15:43:00

When running in appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint on multi-bladed systems. A successful exploit can allow the attacker to cross a security boundary.  Note: Software...

  • EPSS 0.24%
  • Veröffentlicht 14.02.2024 17:15:12
  • Zuletzt bearbeitet 05.09.2025 15:49:32

When BIG-IP is deployed in high availability (HA) and an iControl REST API token is updated, the change does not sync to the peer device. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

  • EPSS 0.36%
  • Veröffentlicht 14.02.2024 17:15:11
  • Zuletzt bearbeitet 12.12.2024 19:12:18

When BIG-IP AFM Device DoS or DoS profile is configured with NXDOMAIN attack vector and bad actor detection, undisclosed queries can cause the Traffic Management Microkernel (TMM) to terminate.  NOTE: Software versions which have reached End of Tech...

  • EPSS 0.27%
  • Veröffentlicht 14.02.2024 17:15:11
  • Zuletzt bearbeitet 23.01.2025 19:42:31

For unspecified traffic patterns, BIG-IP AFM IPS engine may spend an excessive amount of time matching the traffic against signatures, resulting in Traffic Management Microkernel (TMM) restarting and traffic disruption.  Note: Software versions whic...