Page 20 of 521 results (0.014 seconds)

CVSS: 4.3EPSS: 0%CPEs: 341EXPL: 0

On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP (fixed in 17.0.0), a cross-site request forgery (CSRF) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. This vulnerability allows an attacker to run a limited set of commands: ping, traceroute, and WOM diagnostics. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated En todas las versiones de 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x y 11.6.x de F5 BIG-IP (corregida en 17.0.0), Se presenta una vulnerabilidad de tipo cross-site request forgery (CSRF) en una página no revelada de la utilidad de configuración de BIG-IP. Esta vulnerabilidad permite a un atacante ejecutar un conjunto limitado de comandos: ping, traceroute y diagnósticos WOM. Nota: Las versiones de software que han alcanzado el Fin del Soporte Técnico (EoTS) no son evaluadas • https://support.f5.com/csp/article/K49905324 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 97%CPEs: 66EXPL: 50

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated En F5 BIG-IP versiones 16.1.x anteriores a 16.1.2.2, versiones 15.1.x anteriores a 15.1.5.1, versiones 14.1.x anteriores a 14.1.4.6, versiones 13.1.x anteriores a 13.1.5 y todas las versiones 12.1.x y 11.6.x, las peticiones no reveladas pueden omitir la autenticación REST de iControl. Nota: las versiones de software que han alcanzado el Fin del Soporte Técnico (EoTS) no son evaluadas F5 BIG-IP contains a missing authentication in critical function vulnerability which can allow for remote code execution, creation or deletion of files, or disabling services. • https://github.com/alt3kx/CVE-2022-1388_PoC https://www.exploit-db.com/exploits/50932 https://github.com/horizon3ai/CVE-2022-1388 https://github.com/0xf4n9x/CVE-2022-1388 https://github.com/doocop/CVE-2022-1388-EXP https://github.com/ZephrFish/F5-CVE-2022-1388-Exploit https://github.com/numanturle/CVE-2022-1388 https://github.com/sherlocksecurity/CVE-2022-1388-Exploit-POC https://github.com/Al1ex/CVE-2022-1388 https://github.com/jheeree/CVE-2022-1388-checker https: • CWE-306: Missing Authentication for Critical Function •

CVSS: 4.3EPSS: 0%CPEs: 143EXPL: 0

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, and 14.1.x versions prior to 14.1.4.6, an authenticated attacker can modify or delete Dashboards created by other BIG-IP users in the Traffic Management User Interface (TMUI). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated En F5 BIG-IP versiones 16.1.x anteriores a 16.1.2.2, en las versiones 15.1.x anteriores a 15.1.5.1 y en las versiones 14.1.x anteriores a 14.1.4.6, un atacante autenticado puede modificar o eliminar los paneles creados por otros usuarios de BIG-IP en Traffic Management User Interface (TMUI). Nota: Las versiones de software que han alcanzado el Fin del Soporte Técnico (EoTS) no son evaluadas • https://support.f5.com/csp/article/K41877405 • CWE-269: Improper Privilege Management •

CVSS: 5.5EPSS: 0%CPEs: 33EXPL: 0

On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, BIG-IP Edge Client may log sensitive APM session-related information when VPN is launched on a Windows system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated En F5 BIG-IP APM versiones 16.1.x anteriores a 16.1.2.2, las versiones 15.1.x anteriores a 15.1.5.1, las versiones 14.1.x anteriores a 14.1.4.6, las versiones 13.1.x anteriores a 13.1.5, y todas las versiones de 12.1. x y 11.6.x, así como las versiones de F5 BIG-IP APM Clients 7.x anteriores a 7.2.1.5, BIG-IP Edge Client puede registrar información confidencial relacionada con la sesión de APM cuando es iniciada la VPN en un sistema Windows. Nota: Las versiones de software que han alcanzado el Fin del Soporte Técnico (EoTS) no son evaluadas • https://support.f5.com/csp/article/K57110035 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

On 16.1.x versions prior to 16.1.2.2 and 15.1.x versions prior to 15.1.5.1, BIG-IP APM does not properly validate configurations, allowing an authenticated attacker with high privileges to manipulate the APM policy leading to privilege escalation/remote code execution. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated En versiones 16.1.x anteriores a 16.1.2.2 y en versiones 15.1.x anteriores a 15.1.5.1, BIG-IP APM no comprueba apropiadamente las configuraciones, lo que permite a un atacante autenticado con altos privilegios manipular la política de APM, conllevando a una escalada de privilegios/ejecución de código remota. Nota: Las versiones de software que han alcanzado el Fin del Soporte Técnico (EoTS) no son evaluadas • https://support.f5.com/csp/article/K57555833 • CWE-20: Improper Input Validation •