F5

Big-ip Ddos Hybrid Defender

86 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.23%
  • Veröffentlicht 12.02.2021 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:51:03

On all versions of BIG-IP 12.1.x and 11.6.x, the original TLS protocol includes a weakness in the master secret negotiation that is mitigated by the Extended Master Secret (EMS) extension defined in RFC 7627. TLS connections that do not use EMS are v...

  • EPSS 0.32%
  • Veröffentlicht 12.02.2021 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:51:03

On BIG-IP version 16.0.x before 16.0.1, 15.1.x before 15.1.1, 14.1.x before 14.1.2.8, 13.1.x before 13.1.3.5, and all 12.1.x versions, a reflected Cross-Site Scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration util...

  • EPSS 0.65%
  • Veröffentlicht 12.02.2021 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:51:03

On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, and 14.1.x before 14.1.3.1, under some circumstances, Traffic Management Microkernel (TMM) may restart on the BIG-IP system while passing large bursts of traffic. Note: Software versio...

  • EPSS 0.33%
  • Veröffentlicht 12.02.2021 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:51:02

On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.6 and all versions of BIG-IQ 7.x and 6.x, an authenticated attacker with access to iControl REST over the control plane may be able to ta...

  • EPSS 0.47%
  • Veröffentlicht 24.12.2020 16:15:15
  • Zuletzt bearbeitet 21.11.2024 05:21:41

On BIG-IP 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.3, a cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility.

  • EPSS 0.65%
  • Veröffentlicht 11.12.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:34:53

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

  • EPSS 0.19%
  • Veröffentlicht 19.11.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 05:34:53

In versions 16.0.0-16.0.0.1 and 15.1.0-15.1.1, on specific BIG-IP platforms, attackers may be able to obtain TCP sequence numbers from the BIG-IP system that can be reused in future connections with the same source and destination port and IP numbers...

  • EPSS 0.15%
  • Veröffentlicht 05.11.2020 20:15:17
  • Zuletzt bearbeitet 21.11.2024 05:34:52

In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of...

  • EPSS 0.65%
  • Veröffentlicht 05.11.2020 20:15:17
  • Zuletzt bearbeitet 21.11.2024 05:34:52

In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.3, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, and 13.1.0-13.1.3.4, BIG-IP Virtual Edition (VE) systems on VMware, with an Intel-based 85299 Network Interface Controller (NIC) card and Single Root I/O Virtualization (...

  • EPSS 0.13%
  • Veröffentlicht 29.10.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:34:51

On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow.