CVE-2020-27728
- EPSS 0.65%
- Veröffentlicht 24.12.2020 16:15:15
- Zuletzt bearbeitet 21.11.2024 05:21:42
On BIG-IP ASM & Advanced WAF versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.3, under certain conditions, Analytics, Visibility, and Reporting daemon (AVRD) may generate a core file and restart on the BIG-IP system when processing requests...
CVE-2020-27718
- EPSS 0.65%
- Veröffentlicht 24.12.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:21:41
When a BIG-IP ASM or Advanced WAF system running version 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, or 11.6.1-11.6.5.2 processes requests with JSON payload, an unusually large number of parameters can cause exc...
CVE-2020-5949
- EPSS 0.65%
- Veröffentlicht 11.12.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:34:53
On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.
CVE-2020-5947
- EPSS 0.19%
- Veröffentlicht 19.11.2020 01:15:12
- Zuletzt bearbeitet 21.11.2024 05:34:53
In versions 16.0.0-16.0.0.1 and 15.1.0-15.1.1, on specific BIG-IP platforms, attackers may be able to obtain TCP sequence numbers from the BIG-IP system that can be reused in future connections with the same source and destination port and IP numbers...
CVE-2020-5939
- EPSS 0.65%
- Veröffentlicht 05.11.2020 20:15:17
- Zuletzt bearbeitet 21.11.2024 05:34:52
In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.3, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, and 13.1.0-13.1.3.4, BIG-IP Virtual Edition (VE) systems on VMware, with an Intel-based 85299 Network Interface Controller (NIC) card and Single Root I/O Virtualization (...
CVE-2020-5943
- EPSS 0.15%
- Veröffentlicht 05.11.2020 20:15:17
- Zuletzt bearbeitet 21.11.2024 05:34:52
In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of...
CVE-2020-5946
- EPSS 0.65%
- Veröffentlicht 05.11.2020 20:15:17
- Zuletzt bearbeitet 21.11.2024 05:34:52
In BIG-IP Advanced WAF and FPS versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, under some circumstances, certain format client-side alerts sent to the BIG-IP virtual server configured with DataSafe may cause the Traffic Management Mic...
CVE-2020-5938
- EPSS 0.13%
- Veröffentlicht 29.10.2020 14:15:12
- Zuletzt bearbeitet 21.11.2024 05:34:51
On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow.
CVE-2020-5929
- EPSS 0.67%
- Veröffentlicht 25.09.2020 14:15:13
- Zuletzt bearbeitet 21.11.2024 05:34:50
In versions 13.0.0-13.0.0 HF2, 12.1.0-12.1.2 HF1, and 11.6.1-11.6.2, BIG-IP platforms with Cavium Nitrox SSL hardware acceleration cards, a Virtual Server configured with a Client SSL profile, and using Anonymous (ADH) or Ephemeral (DHE) Diffie-Hellm...
CVE-2020-5913
- EPSS 0.19%
- Veröffentlicht 26.08.2020 15:15:13
- Zuletzt bearbeitet 21.11.2024 05:34:49
In versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2, the BIG-IP Client or Server SSL profile ignores revoked certificates, even when a valid CRL is present. This impacts SSL/TLS connections and may resu...