CVE-2017-6131
https://notcve.org/view.php?id=CVE-2017-6131
In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH. En algunas circunstancias, una instancia de nube de Azure de F5 BIG-IP versiones 12.0.0 hasta 12.1.2 y versión 13.0.0, puede contener una contraseña administrativa por defecto que podría usarse para iniciar sesión de manera remota en el sistema BIG-IP. • http://www.securitytracker.com/id/1038569 https://support.f5.com/csp/article/K61757346 • CWE-798: Use of Hard-coded Credentials •
CVE-2016-9250
https://notcve.org/view.php?id=CVE-2016-9250
In F5 BIG-IP 11.2.1, 11.4.0 through 11.6.1, and 12.0.0 through 12.1.2, an unauthenticated user with access to the control plane may be able to delete arbitrary files through an undisclosed mechanism. En F5 BIG-IP 11.2.1, 11.4.0 a 11.6.1 y 12.0.0 a 12.1.2, un usuario no autenticado con acceso al panel de control puede ser capaz de borrar archivos arbitrarios a través de un mecanismo no revelado. • https://support.f5.com/csp/article/K55792317 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2016-9251
https://notcve.org/view.php?id=CVE-2016-9251
In F5 BIG-IP 12.0.0 through 12.1.2, an authenticated attacker may be able to cause an escalation of privileges through a crafted iControl REST connection. En F5 BIG-IP desde la versión 12.0.0 hasta la 12.1.2, un atacante autenticado puede causar una escalada de privilegios a través de una conexión iControl REST manipulada. • http://www.securitytracker.com/id/1038414 https://support.f5.com/csp/article/K41107914 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2017-6137
https://notcve.org/view.php?id=CVE-2017-6137
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, PSM, WebAccelerator, and WebSafe 11.6.1 HF1, 12.0.0 HF3, 12.0.0 HF4, and 12.1.0 through 12.1.2, undisclosed traffic patterns received while software SYN cookie protection is engaged may cause a disruption of service to the Traffic Management Microkernel (TMM) on specific platforms and configurations. En LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, PSM, WebAccelerator y WebSafe versiones 11.6.1 HF1, 12.0.0 HF3, 12.0.0 HF4 y versiones 12.1.0 hasta 12.1.2 de F5 BIG-IP, Los patrones de tráfico no divulgados recibidos mientras la protección de cookies SYN del software es activada pueden causar una interrupción del servicio al Microkernel de Administración de Tráfico (TMM) en plataformas y configuraciones específicas. • http://www.securitytracker.com/id/1038409 https://support.f5.com/csp/article/K82851041 •
CVE-2016-9253
https://notcve.org/view.php?id=CVE-2016-9253
In F5 BIG-IP 12.1.0 through 12.1.2, specific websocket traffic patterns may cause a disruption of service for virtual servers configured to use the websocket profile. En F5 BIG-IP desde la versión 12.1.0 hasta la 12.1.2, patrones de tráfico websocket específicos, pueden causar una interrupción del servicio en servidores virtuales configurados para usar el perfil websocket. • http://www.securitytracker.com/id/1038415 https://support.f5.com/csp/article/K51351360 • CWE-20: Improper Input Validation •