F5

Big-ip Link Controller

445 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.22%
  • Published 27.03.2020 15:15:12
  • Last modified 21.11.2024 05:34:42

On BIG-IP 15.0.0-15.0.1.2, 14.1.0-14.1.2.2, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, users with non-administrator roles (for example, Guest or Resource Administrator) with tmsh shell access c...

  • EPSS 0.89%
  • Published 27.03.2020 15:15:12
  • Last modified 21.11.2024 05:34:43

On BIG-IP 15.1.0.1, specially formatted HTTP/3 messages may cause TMM to produce a core file.

  • EPSS 0.26%
  • Published 27.03.2020 15:15:12
  • Last modified 21.11.2024 05:34:43

On BIG-IP 15.0.0-15.1.0.2, 14.1.0-14.1.2.3, 13.1.0-13.1.3.2, 12.1.0-12.1.5.1, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, in a High Availability (HA) network failover in Device Service Cluster (DSC), the failover service does ...

  • EPSS 0.89%
  • Published 27.03.2020 15:15:12
  • Last modified 21.11.2024 05:34:43

On BIG-IP 12.1.0-12.1.5, the TMM process may produce a core file in some cases when Ram Cache incorrectly optimizes stored data resulting in memory errors.

  • EPSS 0.89%
  • Published 27.03.2020 15:15:12
  • Last modified 21.11.2024 05:34:43

On BIG-IP 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.2, under certain conditions, TMM may crash or stop processing new traffic with the DPDK/ENA driver on AWS systems while sending traffic. This issue does not affect any other platforms, har...

Exploit
  • EPSS 14.66%
  • Published 21.02.2020 18:15:11
  • Last modified 21.11.2024 01:53:56

The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by obser...

  • EPSS 0.89%
  • Published 06.02.2020 16:15:12
  • Last modified 21.11.2024 05:34:42

On BIG-IP 15.0.0-15.0.1.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.6.0-11.6.5.1, the tmm crashes under certain circumstances when using the connector profile if a specific sequence of connections are made.

  • EPSS 0.89%
  • Published 06.02.2020 16:15:12
  • Last modified 21.11.2024 05:34:42

On BIG-IP 15.0.0-15.0.1.1 and 14.1.0-14.1.2.2, while processing specifically crafted traffic using the default 'xnet' driver, Virtual Edition instances hosted in Amazon Web Services (AWS) may experience a TMM restart.

  • EPSS 0.9%
  • Published 14.01.2020 17:15:13
  • Last modified 21.11.2024 05:34:41

Undisclosed traffic patterns received may cause a disruption of service to the Traffic Management Microkernel (TMM). This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM r...

  • EPSS 0.21%
  • Published 14.01.2020 16:15:11
  • Last modified 21.11.2024 05:34:41

On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does ...