![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5876
https://notcve.org/view.php?id=CVE-2020-5876
30 Apr 2020 — On BIG-IP 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, a race condition exists where mcpd and other processes may make unencrypted connection attempts to a new configuration sync peer. The race condition can occur when changing the ConfigSync IP address of a peer, adding a new peer, or when the Traffic Management Microkernel (TMM) first starts up. En BIG-IP versiones 15.0.0 hasta 15.0.1.3, 14.1.0 hasta 14.1.2.3, 13.1.0 hasta 13.1.3.3, 12.1.0 hasta 12.1.5.1 y 11.6.... • https://support.f5.com/csp/article/K32121038 • CWE-319: Cleartext Transmission of Sensitive Information CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5875
https://notcve.org/view.php?id=CVE-2020-5875
30 Apr 2020 — On BIG-IP 15.0.0-15.0.1 and 14.1.0-14.1.2.3, under certain conditions, the Traffic Management Microkernel (TMM) may generate a core file and restart while processing SSL traffic with an HTTP/2 full proxy. En BIG-IP versiones 15.0.0 hasta 15.0.1 y 14.1.0 hasta 14.1.2.3, bajo determinadas condiciones, el Traffic Management Microkernel (TMM) puede generar un archivo central y reiniciarse mientras procesa el tráfico SSL con un proxy HTTP/2 completo. • https://support.f5.com/csp/article/K65372933 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5878
https://notcve.org/view.php?id=CVE-2020-5878
30 Apr 2020 — On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.3, Traffic Management Microkernel (TMM) may restart on BIG-IP Virtual Edition (VE) while processing unusual IP traffic. En las versiones 15.1.0 hasta 15.1.0.1, 15.0.0 hasta 15.0.1.1 y 14.1.0 hasta 14.1.2.3, Traffic Management Microkernel (TMM) puede reiniciarse en BIG-IP Virtual Edition (VE) mientras procesa un tráfico IP inusual. • https://support.f5.com/csp/article/K35750231 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5873
https://notcve.org/view.php?id=CVE-2020-5873
30 Apr 2020 — On BIG-IP 15.0.0-15.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.6.1-11.6.5 and BIG-IQ 5.2.0-7.1.0, a user associated with the Resource Administrator role who has access to the secure copy (scp) utility but does not have access to Advanced Shell (bash) can execute arbitrary commands using a maliciously crafted scp request. En BIG-IP versiones 15.0.0 hasta 15.0.1, 14.1.0 hasta 14.1.2.3, 13.1.0 hasta 13.1.3.1, 12.1.0 hasta 12.1.5 y 11.6.1 hasta 11.6.5 y BIG-IQ versiones 5.2.0 hasta 7.1.0, un u... • https://support.f5.com/csp/article/K03585731 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5874
https://notcve.org/view.php?id=CVE-2020-5874
30 Apr 2020 — On BIG-IP APM 15.0.0-15.0.1.2, 14.1.0-14.1.2.3, and 14.0.0-14.0.1, in certain circumstances, an attacker sending specifically crafted requests to a BIG-IP APM virtual server may cause a disruption of service provided by the Traffic Management Microkernel(TMM). En BIG-IP APM versiones 15.0.0 hasta 15.0.1.2, 14.1.0 hasta 14.1.2.3 y 14.0.0 hasta 14.0.1, en determinadas circunstancias, un atacante que envía peticiones específicamente diseñadas a un servidor virtual BIG-IP APM puede causar una interrupción del s... • https://support.f5.com/csp/article/K46901953 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5872
https://notcve.org/view.php?id=CVE-2020-5872
30 Apr 2020 — On BIG-IP 14.1.0-14.1.2.3, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.4.1, when processing TLS traffic with hardware cryptographic acceleration enabled on platforms with Intel QAT hardware, the Traffic Management Microkernel (TMM) may stop responding and cause a failover event. En BIG-IP versiones 14.1.0 hasta 14.1.2.3, 14.0.0 hasta 14.0.1, 13.1.0 hasta 13.1.3.1 y 12.1.0 hasta 12.1.4.1, cuando se procesa el tráfico TLS con aceleración criptográfica de hardware habilitada en plataformas con hardware Int... • https://support.f5.com/csp/article/K63558580 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5871
https://notcve.org/view.php?id=CVE-2020-5871
30 Apr 2020 — On BIG-IP 14.1.0-14.1.2.3, undisclosed requests can lead to a denial of service (DoS) when sent to BIG-IP HTTP/2 virtual servers. The problem can occur when ciphers, which have been blacklisted by the HTTP/2 RFC, are used on backend servers. This is a data-plane issue. There is no control-plane exposure. En BIG-IP versiones 14.1.0 hasta 14.1.2.3, las peticiones no reveladas pueden conllevar a una denegación de servicio (DoS) cuando son enviadas hacia los servidores virtuales HTTP/2 de BIG-IP. • https://support.f5.com/csp/article/K43450419 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5862
https://notcve.org/view.php?id=CVE-2020-5862
27 Mar 2020 — On BIG-IP 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.2, under certain conditions, TMM may crash or stop processing new traffic with the DPDK/ENA driver on AWS systems while sending traffic. This issue does not affect any other platforms, hardware or virtual, or any other cloud provider since the affected driver is specific to AWS. En BIG-IP versiones 15.1.0-15.1.0.1, 15.0.0-15.0.1.1 y 14.1.0-14.1.2.2, bajo determinadas condiciones, TMM puede bloquear o detener el procesamiento de tráfico nuevo con ... • https://support.f5.com/csp/article/K01054113 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5858
https://notcve.org/view.php?id=CVE-2020-5858
27 Mar 2020 — On BIG-IP 15.0.0-15.0.1.2, 14.1.0-14.1.2.2, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, users with non-administrator roles (for example, Guest or Resource Administrator) with tmsh shell access can execute arbitrary commands with elevated privilege via a crafted tmsh command. En BIG-IP versiones 15.0.0-15.0.1.2, 14.1.0-14.1.2.2, 13.1.0-13.1.3.2, 12.1.0-12.1.5 y 11.5.2-11.6.5.1 y BIG-IQ versiones 7.0. 0, 6.0.0-6.1.0 y 5.2.0-5.4.0, los usuarios con roles ... • https://support.f5.com/csp/article/K36814487 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-5860
https://notcve.org/view.php?id=CVE-2020-5860
27 Mar 2020 — On BIG-IP 15.0.0-15.1.0.2, 14.1.0-14.1.2.3, 13.1.0-13.1.3.2, 12.1.0-12.1.5.1, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, in a High Availability (HA) network failover in Device Service Cluster (DSC), the failover service does not require a strong form of authentication and HA network failover traffic is not encrypted by Transport Layer Security (TLS). En BIG-IP versiones 15.0.0-15.1.0.2, 14.1.0-14.1.2.3, 13.1.0-13.1.3.2, 12.1.0-12.1.5.1 y 11.5.2-11.6.5.1 y BIG-IQ versiones 7.0. 0, 6.... • https://support.f5.com/csp/article/K67472032 • CWE-287: Improper Authentication CWE-319: Cleartext Transmission of Sensitive Information •