CVE-2026-20732
- EPSS 0.06%
- Veröffentlicht 04.02.2026 15:02:05
- Zuletzt bearbeitet 13.02.2026 21:44:33
A vulnerability exists in an undisclosed BIG-IP Configuration utility page that may allow an attacker to spoof error messages. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-61990
- EPSS 0.07%
- Veröffentlicht 15.10.2025 15:19:52
- Zuletzt bearbeitet 21.10.2025 12:12:24
When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-58071
- EPSS 0.07%
- Veröffentlicht 15.10.2025 15:19:46
- Zuletzt bearbeitet 21.10.2025 19:17:54
When IPsec is configured on the BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-59483
- EPSS 0.05%
- Veröffentlicht 15.10.2025 13:55:55
- Zuletzt bearbeitet 21.10.2025 19:35:20
A validation vulnerability exists in an undisclosed URL in the Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-54755
- EPSS 0.22%
- Veröffentlicht 15.10.2025 13:55:55
- Zuletzt bearbeitet 27.01.2026 13:30:32
A directory traversal vulnerability exists in TMUI that allows a highly privileged authenticated attacker to access files which are not limited to the intended files. Note: Software versions which have reached End of Technical Support (EoTS) are not...
CVE-2025-59481
- EPSS 0.05%
- Veröffentlicht 15.10.2025 13:55:54
- Zuletzt bearbeitet 04.02.2026 17:48:00
A vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with at least resource administrator role to execute arbitrary system commands with higher privileges. A successful ...
CVE-2025-61958
- EPSS 0.05%
- Veröffentlicht 15.10.2025 13:55:53
- Zuletzt bearbeitet 04.02.2026 17:48:10
A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell. For BIG-IP systems running in Appliance mode, a successfu...
CVE-2025-53521
- EPSS 0.07%
- Veröffentlicht 15.10.2025 13:55:52
- Zuletzt bearbeitet 21.10.2025 20:19:15
When a BIG-IP APM Access Policy is configured on a virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-58096
- EPSS 0.07%
- Veröffentlicht 15.10.2025 13:55:52
- Zuletzt bearbeitet 21.10.2025 19:30:28
When the database variable tm.tcpudptxchecksum is configured as non-default value Software-only on a BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End o...
CVE-2025-53868
- EPSS 0.04%
- Veröffentlicht 15.10.2025 13:55:51
- Zuletzt bearbeitet 04.02.2026 17:47:22
When running in Appliance mode, a highly privileged authenticated attacker with access to SCP and SFTP may be able to bypass Appliance mode restrictions using undisclosed commands. Note: Software versions which have reached End of Technical Support ...