![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6158
https://notcve.org/view.php?id=CVE-2017-6158
13 Apr 2018 — In F5 BIG-IP 12.0.0-12.1.2, 11.6.0-11.6.1, 11.5.1-11.5.5, or 11.2.1 there is a vulnerability in TMM related to handling of invalid IP addresses. En F5 BIG-IP, de la versión 12.0.0 a la 12.1.2, de la versión 11.6.0 a la 11.6.1, de la versión 11.5.1 a la 11.5.5 o en la versión 11.2.1, hay una vulnerabilidad en TMM relacionada con la gestión de direcciones IP no válidas. • https://support.f5.com/csp/article/K19361245 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-5506
https://notcve.org/view.php?id=CVE-2018-5506
13 Apr 2018 — In F5 BIG-IP 13.0.0, 12.1.0-12.1.2, 11.6.1, 11.5.1-11.5.5, or 11.2.1 the Apache modules apache_auth_token_mod and mod_auth_f5_auth_token.cpp allow possible unauthenticated bruteforce on the em_server_ip authorization parameter to obtain which SSL client certificates used for mutual authentication between BIG-IQ or Enterprise Manager (EM) and managed BIG-IP devices. En F5 BIG-IP, en su versión 13.0.0, de la versión 12.1.0a la 12.1.2, la versión 11.6.1, de la versión 11.5.1 a la 11.5.5 o en la versión 11.2.1,... • https://support.f5.com/csp/article/K65355492 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6155
https://notcve.org/view.php?id=CVE-2017-6155
13 Apr 2018 — On F5 BIG-IP 13.0.0, 12.0.0-12.1.3.1, 11.6.0-11.6.2, 11.4.1-11.5.5, or 11.2.1, malformed SPDY or HTTP/2 requests may result in a disruption of service to TMM. Data plane is only exposed when a SPDY or HTTP/2 profile is attached to a virtual server. There is no control plane exposure. En F5 BIG-IP, en su versión 13.0.0, de la versión 12.0.0 a la 12.1.3.1, de la versión 11.6.0 a la 11.6.2, la versión 11.4.1a la 11.5.5 o en la versión 11.2.1, las peticiones SPDY o HTTP/2 mal formadas podrían resultar en una in... • https://support.f5.com/csp/article/K10930474 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6148
https://notcve.org/view.php?id=CVE-2017-6148
13 Apr 2018 — Responses to SOCKS proxy requests made through F5 BIG-IP version 13.0.0, 12.0.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5 may cause a disruption of services provided by TMM. The data plane is impacted and exposed only when a SOCKS proxy profile is attached to a Virtual Server. The control plane is not impacted by this vulnerability. Las respuestas a peticiones SOCKS del proxy realizadas a través de F5 BIG-IP, en su versión 13.0.0, de la versión 12.0.0 a la 12.1.3.1, de la versión 11.6.1 a la 11.6.2 o de la ... • https://support.f5.com/csp/article/K55225440 • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6143
https://notcve.org/view.php?id=CVE-2017-6143
13 Apr 2018 — X509 certificate verification was not correctly implemented in the IP Intelligence Subscription and IP Intelligence feed-list features, and thus the remote server's identity is not properly validated in F5 BIG-IP 12.0.0-12.1.2, 11.6.0-11.6.2, or 11.5.0-11.5.5. La verificación de certificados X509 no se implementó correctamente en las características feed-list de IP Intelligence Subscription e IP Intelligence. Por lo tanto, la identidad del servidor remoto no se valida correctamente en F5 BIG-IP, de la versi... • https://support.f5.com/csp/article/K11464209 • CWE-295: Improper Certificate Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-5507
https://notcve.org/view.php?id=CVE-2018-5507
13 Apr 2018 — On F5 BIG-IP versions 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5, vCMP guests running on VIPRION 2100, 4200 and 4300 series blades cannot correctly decrypt ciphertext from established SSL sessions with small MTU. En F5 BIG-IP, en versiones 13.0.0, de la versión 12.1.0 a la 12.1.3.1, de la versión 11.6.1 a la 11.6.2 o de la versión 11.5.1 a la 11.5.5, los invitados vCMP que se ejecutan en blades VIPRION de las series 2100, 4200 y 4300 no puedes descifrar correctamente el texto cifrado de las se... • https://support.f5.com/csp/article/K52521791 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6156
https://notcve.org/view.php?id=CVE-2017-6156
13 Apr 2018 — When the F5 BIG-IP 12.1.0-12.1.1, 11.6.0-11.6.1, 11.5.1-11.5.5, or 11.2.1 system is configured with a wildcard IPSec tunnel endpoint, it may allow a remote attacker to disrupt or impersonate the tunnels that have completed phase 1 IPSec negotiations. The attacker must possess the necessary credentials to negotiate the phase 1 of the IPSec exchange to exploit this vulnerability; in many environment this limits the attack surface to other endpoints under the same administration. Cuando el sistema F5 BIG-IP, d... • https://support.f5.com/csp/article/K05263202 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-5504
https://notcve.org/view.php?id=CVE-2018-5504
22 Mar 2018 — In some circumstances, the Traffic Management Microkernel (TMM) does not properly handle certain malformed Websockets requests/responses, which allows remote attackers to cause a denial-of-service (DoS) or possible remote code execution on the F5 BIG-IP system running versions 13.0.0 - 13.1.0.3 or 12.1.0 - 12.1.3.1. En algunas circunstancias, el TMM (Traffic Management Microkernel) no gestiona correctamente algunas peticiones/respuestas Websockets mal formadas. Esto permite que atacantes remotos provoquen u... • http://www.securitytracker.com/id/1040558 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-5509
https://notcve.org/view.php?id=CVE-2018-5509
22 Mar 2018 — On F5 BIG-IP versions 13.0.0 or 12.1.0 - 12.1.3.1, when a specifically configured virtual server receives traffic of an undisclosed nature, TMM will crash and take the configured failover action, potentially causing a denial of service. The configuration which exposes this issue is not common and in general does not work when enabled in previous versions of BIG-IP. Starting in 12.1.0, BIG-IP will crash if the configuration which exposes this issue is enabled and the virtual server receives non TCP traffic. ... • http://www.securityfocus.com/bid/103504 • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-6150
https://notcve.org/view.php?id=CVE-2017-6150
01 Mar 2018 — Under certain conditions for F5 BIG-IP systems 13.0.0 or 12.1.0 - 12.1.3.1, using FastL4 profiles, when the Reassemble IP Fragments option is disabled (default), some specific large fragmented packets may restart the Traffic Management Microkernel (TMM). Bajo ciertas condiciones para los sistemas F5 BIG-IP 13.0.0 o 12.1.0 - 12.1.3.1 que emplean perfiles FastL4, cuando la opción Reassemble IP Fragments está deshabilitada (por defecto), algunos paquetes grandes fragmentados podrían reiniciar el TMM (Traffic M... • http://www.securityfocus.com/bid/103235 • CWE-20: Improper Input Validation •