F5

Big-ip

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 05.02.2025 18:15:30
  • Zuletzt bearbeitet 21.10.2025 11:40:40

When Client or Server SSL profiles are configured on a Virtual Server, or DNSSEC signing operations are in use, undisclosed traffic can cause an increase in memory and CPU resource utilization. Note: Software versions which have reached End of T...

  • EPSS 0.4%
  • Veröffentlicht 05.02.2025 18:15:29
  • Zuletzt bearbeitet 21.10.2025 11:41:11

When SIP session Application Level Gateway mode (ALG) profile with Passthru Mode enabled and SIP router ALG profile are configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to ter...

  • EPSS 0.34%
  • Veröffentlicht 05.02.2025 18:15:29
  • Zuletzt bearbeitet 21.10.2025 11:40:49

When a BIG-IP message routing profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

  • EPSS 58.33%
  • Veröffentlicht 05.02.2025 18:15:29
  • Zuletzt bearbeitet 21.10.2025 11:41:21

Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands. Note: Software versions which have reached End of Technical Suppor...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 16.10.2024 15:15:16
  • Zuletzt bearbeitet 21.10.2025 11:43:40

BIG-IP monitor functionality may allow an attacker to bypass access control restrictions, regardless of the port lockdown settings.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.31%
  • Veröffentlicht 08.05.2024 15:15:10
  • Zuletzt bearbeitet 21.10.2025 11:38:00

When IPsec is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.52%
  • Veröffentlicht 08.05.2024 15:15:10
  • Zuletzt bearbeitet 21.10.2025 11:38:35

A reflected cross-site scripting (XSS) vulnerability exist in undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which have reached ...

  • EPSS 0.26%
  • Veröffentlicht 08.05.2024 15:15:10
  • Zuletzt bearbeitet 03.02.2026 01:15:56

Under certain conditions, a data leak may occur in the Traffic Management Microkernels (TMMs) of BIG-IP tenants running on VELOS and rSeries platforms. This leak occurs randomly and cannot be deliberately triggered. If it occurs, it may leak up to 64...

  • EPSS 0.95%
  • Veröffentlicht 08.05.2024 15:15:09
  • Zuletzt bearbeitet 21.10.2025 11:39:36

A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which have reached...

  • EPSS 0.31%
  • Veröffentlicht 08.05.2024 15:15:09
  • Zuletzt bearbeitet 21.10.2025 19:28:04

When an SSL profile with alert timeout is configured with a non-default value on a virtual server, undisclosed traffic along with conditions beyond the attacker's control can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Soft...