F5

Big-ip Application Security Manager

537 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.65%
  • Veröffentlicht 05.11.2020 20:15:17
  • Zuletzt bearbeitet 21.11.2024 05:34:52

On BIG-IP versions 16.0.0-16.0.0.1 and 15.1.0-15.1.0.5, using the RESOLV::lookup command within an iRule may cause the Traffic Management Microkernel (TMM) to generate a core file and restart. This issue occurs when data exceeding the maximum limit o...

  • EPSS 0.15%
  • Veröffentlicht 05.11.2020 20:15:17
  • Zuletzt bearbeitet 21.11.2024 05:34:52

In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of...

  • EPSS 0.45%
  • Veröffentlicht 05.11.2020 20:15:17
  • Zuletzt bearbeitet 21.11.2024 05:34:52

In BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, undisclosed TMUI page contains a stored cross site scripting vulnerability (XSS). The issue allows a minor privilege escalation for resource admin to escalate to full admin.

  • EPSS 0.89%
  • Veröffentlicht 29.10.2020 16:15:15
  • Zuletzt bearbeitet 21.11.2024 05:34:51

On BIG-IP 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, Virtual servers with a OneConnect profile may incorrectly handle WebSockets related HTTP response headers, causing TMM to restart.

  • EPSS 0.25%
  • Veröffentlicht 29.10.2020 16:15:15
  • Zuletzt bearbeitet 21.11.2024 05:34:51

On BIG-IP ASM 15.1.0-15.1.0.5, a cross-site scripting (XSS) vulnerability exists in the BIG-IP ASM Configuration utility response and blocking pages. An authenticated user with administrative privileges can specify a response page with any content, i...

  • EPSS 0.61%
  • Veröffentlicht 29.10.2020 16:15:15
  • Zuletzt bearbeitet 21.11.2024 05:34:51

On versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, when a BIG-IP system that has a virtual server configured with an HTTP compression profile processes compressed HTTP message payloads that require de...

  • EPSS 0.65%
  • Veröffentlicht 29.10.2020 16:15:15
  • Zuletzt bearbeitet 21.11.2024 05:34:51

On BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when handling MQTT traffic through a BIG-IP virtual server associated with an MQTT profile and an iRul...

  • EPSS 0.13%
  • Veröffentlicht 29.10.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:34:51

On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow.

  • EPSS 0.86%
  • Veröffentlicht 25.09.2020 14:15:14
  • Zuletzt bearbeitet 21.11.2024 05:34:50

In BIG-IP 15.0.0-15.1.0.4, 14.1.0-14.1.2.7, 13.1.0-13.1.3.3, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2 and BIG-IQ 5.2.0-7.1.0, unauthenticated attackers can cause disruption of service via undisclosed methods.

  • EPSS 0.67%
  • Veröffentlicht 25.09.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:34:50

In versions 13.0.0-13.0.0 HF2, 12.1.0-12.1.2 HF1, and 11.6.1-11.6.2, BIG-IP platforms with Cavium Nitrox SSL hardware acceleration cards, a Virtual Server configured with a Client SSL profile, and using Anonymous (ADH) or Ephemeral (DHE) Diffie-Hellm...