F5

Big-iq Centralized Management

76 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.31%
  • Published 25.01.2022 20:15:09
  • Last modified 21.11.2024 06:47:47

On BIG-IQ Centralized Management 8.x before 8.1.0, an authenticated administrative role user on a BIG-IQ managed BIG-IP device can access other BIG-IP devices managed by the same BIG-IQ system. Note: Software versions which have reached End of Techni...

Exploit
  • EPSS 14.68%
  • Published 11.11.2021 19:15:07
  • Last modified 22.08.2025 10:33:16

The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ate...

  • EPSS 0.3%
  • Published 14.09.2021 22:15:07
  • Last modified 21.11.2024 05:51:10

BIG-IP version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.4.2, 13.1.x before 13.1.4.1, and all versions of 12.1.x and 11.6.x and all versions of BIG-IQ 8.x, 7.x, and 6.x are vulnerable to cross-site request forgery (CSRF) attack...

Exploit
  • EPSS 4.89%
  • Published 10.06.2021 15:15:09
  • Last modified 21.11.2024 05:51:10

On version 8.0.x before 8.0.0.1, and all 6.x and 7.x versions, the BIG-IQ Configuration utility has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Technical Support (EoT...

  • EPSS 0.35%
  • Published 31.03.2021 18:15:15
  • Last modified 21.11.2024 05:51:08

On all 7.x and 6.x versions (fixed in 8.0.0), undisclosed BIG-IQ pages have a reflected cross-site scripting vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

  • EPSS 0.47%
  • Published 31.03.2021 18:15:15
  • Last modified 21.11.2024 05:51:08

On all 7.x and 6.x versions (fixed in 8.0.0), when using a Quorum device for BIG-IQ high availability (HA) for automatic failover, BIG-IQ does not make use of Transport Layer Security (TLS) with the Corosync protocol. Note: Software versions which ha...

  • EPSS 0.32%
  • Published 31.03.2021 18:15:15
  • Last modified 21.11.2024 05:51:05

On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ HA ElasticSearch service does not implement any form of authentication for the clustering transport services, and all data used by ElasticSearch for transport is unencrypted. Note: Software version...

  • EPSS 0.65%
  • Published 31.03.2021 18:15:14
  • Last modified 21.11.2024 05:51:05

On all 7.x versions (fixed in 8.0.0), when set up for auto failover, a BIG-IQ Data Collection Device (DCD) cluster member that receives an undisclosed message may cause the corosync process to abort. This behavior may lead to a denial-of-service (DoS...

  • EPSS 0.24%
  • Published 31.03.2021 17:15:13
  • Last modified 21.11.2024 05:51:05

On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ high availability (HA) when using a Quorum device for automatic failover does not implement any form of authentication with the Corosync daemon. Note: Software versions which have reached End of So...

Warning Exploit
  • EPSS 94.47%
  • Published 31.03.2021 15:15:15
  • Last modified 02.04.2025 19:09:11

On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticat...