CVE-2023-41373
- EPSS 2.64%
- Published 10.10.2023 13:15:21
- Last modified 21.11.2024 08:21:10
A directory traversal vulnerability exists in the BIG-IP Configuration Utility that may allow an authenticated attacker to execute commands on the BIG-IP system. For BIG-IP system running in Appliance mode, a successful exploit can allow the attacke...
CVE-2023-41964
- EPSS 0.2%
- Published 10.10.2023 13:15:21
- Last modified 21.11.2024 08:22:00
The BIG-IP and BIG-IQ systems do not encrypt some sensitive information written to Database (DB) variables. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2023-43485
- EPSS 0.23%
- Published 10.10.2023 13:15:21
- Last modified 21.11.2024 08:24:08
When TACACS+ audit forwarding is configured on BIG-IP or BIG-IQ system, sharedsecret is logged in plaintext in the audit log. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2023-43611
- EPSS 0.11%
- Published 10.10.2023 13:15:21
- Last modified 21.11.2024 08:24:27
The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process. This vulnerability is due to an incomplete fix for CVE-2023-38418. Note: Software versions which have reached End of...
CVE-2023-43746
- EPSS 0.06%
- Published 10.10.2023 13:15:21
- Last modified 21.11.2024 08:24:42
When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing BIG-IP external monitor on a BIG-IP system. A successful exploit can allow the attacker to cross a se...
CVE-2023-40542
- EPSS 0.58%
- Published 10.10.2023 13:15:20
- Last modified 19.09.2025 20:18:14
When TCP Verified Accept is enabled on a TCP profile that is configured on a Virtual Server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are no...
CVE-2023-40537
- EPSS 0.36%
- Published 10.10.2023 13:15:20
- Last modified 21.11.2024 08:19:40
An authenticated user's session cookie may remain valid for a limited time after logging out from the BIG-IP Configuration utility on a multi-blade VIPRION platform. Note: Software versions which have reached End of Technical Support (EoTS) are no...
CVE-2023-40534
- EPSS 0.57%
- Published 10.10.2023 13:15:20
- Last modified 21.11.2024 08:19:40
When a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, and an iRule using the HTTP_REQUEST event or Local Traffic Policy are associated with the virtual server, undisclosed requests can cause TMM to termina...
CVE-2023-3470
- EPSS 0.07%
- Published 02.08.2023 16:15:10
- Last modified 21.11.2024 08:17:20
Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account. The predictable nature of the password allows an authenticated user with TMSH access to the BIG-IP system, or anyone with ...
CVE-2023-38423
- EPSS 0.34%
- Published 02.08.2023 16:15:10
- Last modified 21.11.2024 08:13:32
A cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of...