CVE-2024-23603
- EPSS 0.29%
- Veröffentlicht 14.02.2024 17:15:13
- Zuletzt bearbeitet 05.09.2025 15:51:22
An SQL injection vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CVE-2024-21782
- EPSS 0.07%
- Veröffentlicht 14.02.2024 17:15:12
- Zuletzt bearbeitet 23.01.2025 19:47:50
BIG-IP or BIG-IQ Resource Administrators and Certificate Managers who have access to the secure copy (scp) utility but do not have access to Advanced shell (bash) can execute arbitrary commands with a specially crafted command string. This vulnerabil...
CVE-2024-21789
- EPSS 0.27%
- Veröffentlicht 14.02.2024 17:15:12
- Zuletzt bearbeitet 12.12.2024 19:11:30
When a BIG-IP ASM/Advanced WAF security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evalua...
CVE-2024-21849
- EPSS 0.31%
- Veröffentlicht 14.02.2024 17:15:12
- Zuletzt bearbeitet 12.12.2024 19:10:52
When an Advanced WAF/ASM security policy and a Websockets profile are configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have reached End of T...
CVE-2024-22093
- EPSS 0.32%
- Veröffentlicht 14.02.2024 17:15:12
- Zuletzt bearbeitet 05.09.2025 15:43:00
When running in appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint on multi-bladed systems. A successful exploit can allow the attacker to cross a security boundary. Note: Software...
CVE-2024-22389
- EPSS 0.24%
- Veröffentlicht 14.02.2024 17:15:12
- Zuletzt bearbeitet 05.09.2025 15:49:32
When BIG-IP is deployed in high availability (HA) and an iControl REST API token is updated, the change does not sync to the peer device. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CVE-2023-46747
- EPSS 94.44%
- Veröffentlicht 26.10.2023 21:15:08
- Zuletzt bearbeitet 27.10.2025 17:07:09
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions wh...
CVE-2023-46748
- EPSS 3.88%
- Veröffentlicht 26.10.2023 21:15:08
- Zuletzt bearbeitet 27.10.2025 17:07:05
An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which may allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execut...
CVE-2023-44487
- EPSS 94.42%
- Veröffentlicht 10.10.2023 14:15:10
- Zuletzt bearbeitet 07.11.2025 19:00:41
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-45219
- EPSS 0.11%
- Veröffentlicht 10.10.2023 13:15:22
- Zuletzt bearbeitet 21.11.2024 08:26:34
Exposure of Sensitive Information vulnerability exist in an undisclosed BIG-IP TMOS shell (tmsh) command which may allow an authenticated attacker with resource administrator role privileges to view sensitive information. Note: Software versions ...