![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-5519
https://notcve.org/view.php?id=CVE-2018-5519
02 May 2018 — On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any user when licensed for Appliance Mode), this allows more permissive file access than intended. En F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3 o 11.2.1-11.6.3.1, los usuarios administrativos pueden explotar la utilidad ssldump por medio de métodos no revelados par... • http://www.securitytracker.com/id/1040803 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-5520
https://notcve.org/view.php?id=CVE-2018-5520
02 May 2018 — On an F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.1, or 11.2.1-11.6.3.1 system configured in Appliance mode, the TMOS Shell (tmsh) may allow an administrative user to use the dig utility to gain unauthorized access to file system resources. En un sistema F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.1 o 11.2.1-11.6.3.1 configurado en modo Appliance, TMOS Shell (tmsh) podría permitir que un usuario administrativo emplee la utilidad dig para obtener acceso no autorizado a los recursos del sistema de archivos. • http://www.securitytracker.com/id/1040798 • CWE-863: Incorrect Authorization •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6158
https://notcve.org/view.php?id=CVE-2017-6158
13 Apr 2018 — In F5 BIG-IP 12.0.0-12.1.2, 11.6.0-11.6.1, 11.5.1-11.5.5, or 11.2.1 there is a vulnerability in TMM related to handling of invalid IP addresses. En F5 BIG-IP, de la versión 12.0.0 a la 12.1.2, de la versión 11.6.0 a la 11.6.1, de la versión 11.5.1 a la 11.5.5 o en la versión 11.2.1, hay una vulnerabilidad en TMM relacionada con la gestión de direcciones IP no válidas. • https://support.f5.com/csp/article/K19361245 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-5506
https://notcve.org/view.php?id=CVE-2018-5506
13 Apr 2018 — In F5 BIG-IP 13.0.0, 12.1.0-12.1.2, 11.6.1, 11.5.1-11.5.5, or 11.2.1 the Apache modules apache_auth_token_mod and mod_auth_f5_auth_token.cpp allow possible unauthenticated bruteforce on the em_server_ip authorization parameter to obtain which SSL client certificates used for mutual authentication between BIG-IQ or Enterprise Manager (EM) and managed BIG-IP devices. En F5 BIG-IP, en su versión 13.0.0, de la versión 12.1.0a la 12.1.2, la versión 11.6.1, de la versión 11.5.1 a la 11.5.5 o en la versión 11.2.1,... • https://support.f5.com/csp/article/K65355492 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6155
https://notcve.org/view.php?id=CVE-2017-6155
13 Apr 2018 — On F5 BIG-IP 13.0.0, 12.0.0-12.1.3.1, 11.6.0-11.6.2, 11.4.1-11.5.5, or 11.2.1, malformed SPDY or HTTP/2 requests may result in a disruption of service to TMM. Data plane is only exposed when a SPDY or HTTP/2 profile is attached to a virtual server. There is no control plane exposure. En F5 BIG-IP, en su versión 13.0.0, de la versión 12.0.0 a la 12.1.3.1, de la versión 11.6.0 a la 11.6.2, la versión 11.4.1a la 11.5.5 o en la versión 11.2.1, las peticiones SPDY o HTTP/2 mal formadas podrían resultar en una in... • https://support.f5.com/csp/article/K10930474 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6148
https://notcve.org/view.php?id=CVE-2017-6148
13 Apr 2018 — Responses to SOCKS proxy requests made through F5 BIG-IP version 13.0.0, 12.0.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5 may cause a disruption of services provided by TMM. The data plane is impacted and exposed only when a SOCKS proxy profile is attached to a Virtual Server. The control plane is not impacted by this vulnerability. Las respuestas a peticiones SOCKS del proxy realizadas a través de F5 BIG-IP, en su versión 13.0.0, de la versión 12.0.0 a la 12.1.3.1, de la versión 11.6.1 a la 11.6.2 o de la ... • https://support.f5.com/csp/article/K55225440 • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6143
https://notcve.org/view.php?id=CVE-2017-6143
13 Apr 2018 — X509 certificate verification was not correctly implemented in the IP Intelligence Subscription and IP Intelligence feed-list features, and thus the remote server's identity is not properly validated in F5 BIG-IP 12.0.0-12.1.2, 11.6.0-11.6.2, or 11.5.0-11.5.5. La verificación de certificados X509 no se implementó correctamente en las características feed-list de IP Intelligence Subscription e IP Intelligence. Por lo tanto, la identidad del servidor remoto no se valida correctamente en F5 BIG-IP, de la versi... • https://support.f5.com/csp/article/K11464209 • CWE-295: Improper Certificate Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-5510
https://notcve.org/view.php?id=CVE-2018-5510
13 Apr 2018 — On F5 BIG-IP 11.5.4 HF4-11.5.5, the Traffic Management Microkernel (TMM) may restart when processing a specific sequence of packets on IPv6 virtual servers. En F5 BIG-IP, en su versión 11.5.4 HF4-11.5.5, el TMM (Traffic Management Microkernel) podría reiniciarse al procesar una secuencia determinada de paquetes en los servidores virtuales IPv6. • https://support.f5.com/csp/article/K77671456 • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-5507
https://notcve.org/view.php?id=CVE-2018-5507
13 Apr 2018 — On F5 BIG-IP versions 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5, vCMP guests running on VIPRION 2100, 4200 and 4300 series blades cannot correctly decrypt ciphertext from established SSL sessions with small MTU. En F5 BIG-IP, en versiones 13.0.0, de la versión 12.1.0 a la 12.1.3.1, de la versión 11.6.1 a la 11.6.2 o de la versión 11.5.1 a la 11.5.5, los invitados vCMP que se ejecutan en blades VIPRION de las series 2100, 4200 y 4300 no puedes descifrar correctamente el texto cifrado de las se... • https://support.f5.com/csp/article/K52521791 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6156
https://notcve.org/view.php?id=CVE-2017-6156
13 Apr 2018 — When the F5 BIG-IP 12.1.0-12.1.1, 11.6.0-11.6.1, 11.5.1-11.5.5, or 11.2.1 system is configured with a wildcard IPSec tunnel endpoint, it may allow a remote attacker to disrupt or impersonate the tunnels that have completed phase 1 IPSec negotiations. The attacker must possess the necessary credentials to negotiate the phase 1 of the IPSec exchange to exploit this vulnerability; in many environment this limits the attack surface to other endpoints under the same administration. Cuando el sistema F5 BIG-IP, d... • https://support.f5.com/csp/article/K05263202 •