
CVE-2020-27724
https://notcve.org/view.php?id=CVE-2020-27724
24 Dec 2020 — In BIG-IP APM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, on systems running more than one TMM instance, authenticated VPN users may consume excessive resources by sending specially-crafted malicious traffic over the tunnel. En BIG-IP APM versiones 16.0.0-16.0.0.1, 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0- 12.1.5.2 y 11.6.1-11.6.5.2, en sistemas que ejecutan más de una instancia de TMM, los ... • https://support.f5.com/csp/article/K04518313 • CWE-400: Uncontrolled Resource Consumption •

CVE-2020-27718
https://notcve.org/view.php?id=CVE-2020-27718
24 Dec 2020 — When a BIG-IP ASM or Advanced WAF system running version 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, or 11.6.1-11.6.5.2 processes requests with JSON payload, an unusually large number of parameters can cause excessive CPU usage in the BIG-IP ASM bd process. Cuando un sistema BIG-IP ASM o Advanced WAF ejecutándose en las versiones 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1. 5.2, o 11.6.1-11.6.5.2, procesa peticiones con carga útil JSON... • https://support.f5.com/csp/article/K58102101 •

CVE-2020-27721
https://notcve.org/view.php?id=CVE-2020-27721
24 Dec 2020 — In versions 16.0.0-16.0.0.1, 15.1.0-15.1.1, 14.1.0-14.1.3, 13.1.0-13.1.3.5, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, in a BIG-IP DNS / BIG-IP LTM GSLB deployment, under certain circumstances, the BIG-IP DNS system may stop using a BIG-IP LTM virtual server for DNS response. En las versiones 16.0.0-16.0.0.1, 15.1.0-15.1.1, 14.1.0-14.1.3, 13.1.0-13.1.3.5, 12.1.0-12.1.5.2 y 11.6.1-11.6.5.2 , en una implementación de BIG-IP DNS / BIG-IP LTM GSLB, bajo determinadas circunstancias, el sistema BIG-IP DNS puede dejar ... • https://support.f5.com/csp/article/K52035247 •

CVE-2020-27730
https://notcve.org/view.php?id=CVE-2020-27730
11 Dec 2020 — In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities. En versiones 3.0.0-3.9.0, 2.0.0-2.9.0 y 1.0.1, el NGINX Controller Agent no usa rutas absolutas cuando llaman a las utilidades del sistema • https://security.netapp.com/advisory/ntap-20210115-0004 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2020-5949
https://notcve.org/view.php?id=CVE-2020-5949
11 Dec 2020 — On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break. En BIG-IP versiones 14.0.0-14.0.1 y 13.1.0-13.1.3.4, un determinado patrón de tráfico enviado a un servidor virtual configurado con un perfil FTP puede causar que el canal FTP se interrumpa • https://support.f5.com/csp/article/K20984059 •

CVE-2020-27713
https://notcve.org/view.php?id=CVE-2020-27713
11 Dec 2020 — In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory. En determinadas configuraciones en versión 13.1.3.4, cuando un perfil de seguridad HTTP de BIG-IP AFM es aplicado a un servidor virtual y el sistema BIG-IP recibe una petición con características específicas, la conexión es restablecida y ... • https://support.f5.com/csp/article/K37960100 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2020-5950
https://notcve.org/view.php?id=CVE-2020-5950
11 Dec 2020 — On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role. En BIG-IP versiones 14.1.0-14.1.2.6, los endpoints no divulgados en iControl REST, permiten un ataque de tipo XSS reflejado, lo que podría conllevar a un compromiso completo del sistema BIG-IP si el usuario víctima se le concede el papel de administrador • https://support.f5.com/csp/article/K05204103 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-5948
https://notcve.org/view.php?id=CVE-2020-5948
11 Dec 2020 — On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role. En BIG-IP versiones 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2 y 11.6.1- 11.6.5.2, los endpoints no divulgados en iControl REST permiten un ataque de tipo XSS refle... • https://support.f5.com/csp/article/K42696541 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-5947
https://notcve.org/view.php?id=CVE-2020-5947
19 Nov 2020 — In versions 16.0.0-16.0.0.1 and 15.1.0-15.1.1, on specific BIG-IP platforms, attackers may be able to obtain TCP sequence numbers from the BIG-IP system that can be reused in future connections with the same source and destination port and IP numbers. Only these platforms are affected: BIG-IP 2000 series (C112), BIG-IP 4000 series (C113), BIG-IP i2000 series (C117), BIG-IP i4000 series (C115), BIG-IP Virtual Edition (VE). En versiones 16.0.0-16.0.0.1 y 15.1.0-15.1.1, en plataformas BIG-IP específicas, unos ... • https://support.f5.com/csp/article/K64571774 •

CVE-2020-5946
https://notcve.org/view.php?id=CVE-2020-5946
05 Nov 2020 — In BIG-IP Advanced WAF and FPS versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.7, under some circumstances, certain format client-side alerts sent to the BIG-IP virtual server configured with DataSafe may cause the Traffic Management Microkernel (TMM) to restart, resulting in a Denial-of-Service (DoS). En BIG-IP Advanced WAF y FPS, versiones 16.0.0-16.0.0.1, 15.1.0-15.1.0.5 y 14.1.0-14.1.2.7, bajo algunas circunstancias, determinados formatos de alertas del lado del cliente se envían hacia el s... • https://support.f5.com/csp/article/K53821711 •