![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5873
https://notcve.org/view.php?id=CVE-2020-5873
30 Apr 2020 — On BIG-IP 15.0.0-15.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.6.1-11.6.5 and BIG-IQ 5.2.0-7.1.0, a user associated with the Resource Administrator role who has access to the secure copy (scp) utility but does not have access to Advanced Shell (bash) can execute arbitrary commands using a maliciously crafted scp request. En BIG-IP versiones 15.0.0 hasta 15.0.1, 14.1.0 hasta 14.1.2.3, 13.1.0 hasta 13.1.3.1, 12.1.0 hasta 12.1.5 y 11.6.1 hasta 11.6.5 y BIG-IQ versiones 5.2.0 hasta 7.1.0, un u... • https://support.f5.com/csp/article/K03585731 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5872
https://notcve.org/view.php?id=CVE-2020-5872
30 Apr 2020 — On BIG-IP 14.1.0-14.1.2.3, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.4.1, when processing TLS traffic with hardware cryptographic acceleration enabled on platforms with Intel QAT hardware, the Traffic Management Microkernel (TMM) may stop responding and cause a failover event. En BIG-IP versiones 14.1.0 hasta 14.1.2.3, 14.0.0 hasta 14.0.1, 13.1.0 hasta 13.1.3.1 y 12.1.0 hasta 12.1.4.1, cuando se procesa el tráfico TLS con aceleración criptográfica de hardware habilitada en plataformas con hardware Int... • https://support.f5.com/csp/article/K63558580 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5871
https://notcve.org/view.php?id=CVE-2020-5871
30 Apr 2020 — On BIG-IP 14.1.0-14.1.2.3, undisclosed requests can lead to a denial of service (DoS) when sent to BIG-IP HTTP/2 virtual servers. The problem can occur when ciphers, which have been blacklisted by the HTTP/2 RFC, are used on backend servers. This is a data-plane issue. There is no control-plane exposure. En BIG-IP versiones 14.1.0 hasta 14.1.2.3, las peticiones no reveladas pueden conllevar a una denegación de servicio (DoS) cuando son enviadas hacia los servidores virtuales HTTP/2 de BIG-IP. • https://support.f5.com/csp/article/K43450419 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5862
https://notcve.org/view.php?id=CVE-2020-5862
27 Mar 2020 — On BIG-IP 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.2, under certain conditions, TMM may crash or stop processing new traffic with the DPDK/ENA driver on AWS systems while sending traffic. This issue does not affect any other platforms, hardware or virtual, or any other cloud provider since the affected driver is specific to AWS. En BIG-IP versiones 15.1.0-15.1.0.1, 15.0.0-15.0.1.1 y 14.1.0-14.1.2.2, bajo determinadas condiciones, TMM puede bloquear o detener el procesamiento de tráfico nuevo con ... • https://support.f5.com/csp/article/K01054113 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5858
https://notcve.org/view.php?id=CVE-2020-5858
27 Mar 2020 — On BIG-IP 15.0.0-15.0.1.2, 14.1.0-14.1.2.2, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, users with non-administrator roles (for example, Guest or Resource Administrator) with tmsh shell access can execute arbitrary commands with elevated privilege via a crafted tmsh command. En BIG-IP versiones 15.0.0-15.0.1.2, 14.1.0-14.1.2.2, 13.1.0-13.1.3.2, 12.1.0-12.1.5 y 11.5.2-11.6.5.1 y BIG-IQ versiones 7.0. 0, 6.0.0-6.1.0 y 5.2.0-5.4.0, los usuarios con roles ... • https://support.f5.com/csp/article/K36814487 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5860
https://notcve.org/view.php?id=CVE-2020-5860
27 Mar 2020 — On BIG-IP 15.0.0-15.1.0.2, 14.1.0-14.1.2.3, 13.1.0-13.1.3.2, 12.1.0-12.1.5.1, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, in a High Availability (HA) network failover in Device Service Cluster (DSC), the failover service does not require a strong form of authentication and HA network failover traffic is not encrypted by Transport Layer Security (TLS). En BIG-IP versiones 15.0.0-15.1.0.2, 14.1.0-14.1.2.3, 13.1.0-13.1.3.2, 12.1.0-12.1.5.1 y 11.5.2-11.6.5.1 y BIG-IQ versiones 7.0. 0, 6.... • https://support.f5.com/csp/article/K67472032 • CWE-287: Improper Authentication CWE-319: Cleartext Transmission of Sensitive Information •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5857
https://notcve.org/view.php?id=CVE-2020-5857
27 Mar 2020 — On BIG-IP 15.0.0-15.0.1, 14.1.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, undisclosed HTTP behavior may lead to a denial of service. En BIG-IP versiones 15.0.0-15.0.1, 14.1.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5 y 11.5.2-11.6.5.1, un comportamiento HTTP no revelado puede conllevar a una denegación de servicio. • https://support.f5.com/csp/article/K70275209 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5854
https://notcve.org/view.php?id=CVE-2020-5854
06 Feb 2020 — On BIG-IP 15.0.0-15.0.1.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.6.0-11.6.5.1, the tmm crashes under certain circumstances when using the connector profile if a specific sequence of connections are made. En BIG-IP versiones 15.0.0-15.0.1.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.5 y 11.6.0-11.6.5.1, el tmm se bloquea en determinadas circunstancias cuando se usa el perfil connector si una secuencia específica de conexiones es realizada. • https://support.f5.com/csp/article/K50046200 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5856
https://notcve.org/view.php?id=CVE-2020-5856
06 Feb 2020 — On BIG-IP 15.0.0-15.0.1.1 and 14.1.0-14.1.2.2, while processing specifically crafted traffic using the default 'xnet' driver, Virtual Edition instances hosted in Amazon Web Services (AWS) may experience a TMM restart. En BIG-IP versiones 15.0.0-15.0.1.1 y 14.1.0-14.1.2.2, mientras se procesa el tráfico específicamente diseñado usando el controlador predeterminado "xnet", las instancias de Virtual Edition alojadas en Amazon Web Services (AWS) pueden experimentar un reinicio de TMM. • https://support.f5.com/csp/article/K00025388 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5852
https://notcve.org/view.php?id=CVE-2020-5852
14 Jan 2020 — Undisclosed traffic patterns received may cause a disruption of service to the Traffic Management Microkernel (TMM). This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. This issue only impacts specific engineering hotfixes. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. • https://support.f5.com/csp/article/K53590702 •