F5

Big-ip Websafe

96 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.68%
  • Veröffentlicht 02.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:58

On F5 BIG-IP 13.1.0-13.1.0.5, maliciously crafted HTTP/2 request frames can lead to denial of service. There is data plane exposure for virtual servers when the HTTP2 profile is enabled. There is no control plane exposure to this issue.

  • EPSS 4.03%
  • Veröffentlicht 02.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:58

On F5 BIG-IP 13.0.0-13.1.0.5, using RADIUS authentication responses from a RADIUS server with IPv6 addresses may cause TMM to crash, leading to a failover event.

  • EPSS 0.12%
  • Veröffentlicht 02.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:58

On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.2, or 11.2.1-11.6.3.1, Enterprise Manager 3.1.1, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, or F5 iWorkflow 2.0.2-2.3.0, authenticated users granted TMOS Shell (...

  • EPSS 0.75%
  • Veröffentlicht 02.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:58

On F5 BIG-IP 13.1.0-13.1.0.5, malformed TCP packets sent to a self IP address or a FastL4 virtual server may cause an interruption of service. The control plane is not exposed to this issue. This issue impacts the data plane virtual servers and self ...

  • EPSS 0.11%
  • Veröffentlicht 02.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:58

On F5 BIG-IP 13.0.0-13.1.0.5 or 12.0.0-12.1.3.3, malicious root users with access to a VCMP guest can cause a disruption of service on adjacent VCMP guests running on the same host. Exploiting this vulnerability causes the vCMPd process on the adjace...

  • EPSS 0.2%
  • Veröffentlicht 02.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:58

On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any ...

  • EPSS 0.2%
  • Veröffentlicht 02.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:59

On an F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.1, or 11.2.1-11.6.3.1 system configured in Appliance mode, the TMOS Shell (tmsh) may allow an administrative user to use the dig utility to gain unauthorized access to file system resources.

Exploit
  • EPSS 6.04%
  • Veröffentlicht 13.04.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:57

On F5 BIG-IP 13.1.0-13.1.0.3 or 13.0.0, when authenticated administrative users execute commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforc...

  • EPSS 0.65%
  • Veröffentlicht 13.04.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:57

On F5 BIG-IP 11.5.4 HF4-11.5.5, the Traffic Management Microkernel (TMM) may restart when processing a specific sequence of packets on IPv6 virtual servers.

  • EPSS 0.54%
  • Veröffentlicht 13.04.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:56

On F5 BIG-IP versions 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5, vCMP guests running on VIPRION 2100, 4200 and 4300 series blades cannot correctly decrypt ciphertext from established SSL sessions with small MTU.