Page 7 of 47 results (0.013 seconds)

CVSS: 5.9EPSS: 0%CPEs: 43EXPL: 0

F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM, Websafe software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1 are vulnerable to a denial of service attack when the MPTCP option is enabled on a virtual server. Data plane is vulnerable when using the MPTCP option of a TCP profile. There is no control plane exposure. An attacker may be able to disrupt services by causing TMM to restart hence temporarily failing to process traffic. F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM, Websafe en sus versiones de software de la 12.0.0 a la 12.1.2 y de la 11.6.0 a la 11.6.1 son vulnerables a un ataque de denegación de servicio (DoS) cuando la opción MPTCP está habilitada en un servidor virtual. • http://www.securityfocus.com/bid/101633 http://www.securitytracker.com/id/1039669 https://support.f5.com/csp/article/K10002335 •

CVSS: 5.9EPSS: 0%CPEs: 50EXPL: 0

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, Websafe software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4, 11.2.1, in some cases TMM may crash when processing TCP traffic. This vulnerability affects TMM via a virtual server configured with TCP profile. Traffic processing is disrupted while Traffic Management Microkernel (TMM) restarts. If the affected BIG-IP system is configured to be part of a device group, it will trigger a failover to the peer device. En F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, Websafe en versiones de software de la 12.0.0 a la 12.1.2, de la 11.6.0 a la 11.6.1, de la 11.4.0 a la 11.5.4 y en la versión 11.2.1, en algunos casos, TMM podría cerrarse de manera inesperada cuando procesa tráfico TCP. • http://www.securityfocus.com/bid/101635 http://www.securitytracker.com/id/1039673 https://support.f5.com/csp/article/K13421245 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 40EXPL: 0

iControl REST in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe 12.0.0 through 12.1.2 and 13.0.0 includes a service to convert authorization BIGIPAuthCookie cookies to X-F5-Auth-Token tokens. This service does not properly re-validate cookies when making that conversion, allowing once-valid but now expired cookies to be converted to valid tokens. iControl REST en F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM y WebSafe 12.0.0 hasta la versión 12.1.2 y 13.0.0 incluye un servicio para convertir las cookies de autorización BIGIPAuthCookie en tokens X-F5-Auth-Token. Este servicio no revalida correctamente las cookies cuando se realiza la conversión, permitiendo que cookies que fueron válidas otrora, pero que ahora han caducado, se conviertan en tokens válidos. • https://support.f5.com/csp/article/K22317030 • CWE-613: Insufficient Session Expiration •

CVSS: 9.8EPSS: 0%CPEs: 111EXPL: 0

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM, and WebSafe 11.5.1 HF6 through 11.5.4 HF4, 11.6.0 through 11.6.1 HF1, and 12.0.0 through 12.1.2 on VIPRION platforms only, the script which synchronizes SafeNet External Network HSM configuration elements between blades in a clustered deployment will log the HSM partition password in cleartext to the "/var/log/ltm" log file. En F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM y WebSafe 11.5.1 HF6 hasta la versión 11.5.4 HF4, 11.6.0 hasta la versión 11.6.1 HF1 y 12.0.0 hasta la versión 12.1.2 solo en plataformas VIPRION, el script que sincroniza elementos de configuración SafeNet External Network HSM entre hojas en una implementación agrupada registrará la contraseña de partición HSM en texto en claro en el archivo de registro "/var/log/ltm". • http://www.securityfocus.com/bid/101543 http://www.securitytracker.com/id/1039638 https://support.f5.com/csp/article/K74759095 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 5.9EPSS: 0%CPEs: 24EXPL: 0

In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, and WebSafe 12.1.0 through 12.1.2, certain values in a TLS abbreviated handshake when using a client SSL profile with the Session Ticket option enabled may cause disruption of service to the Traffic Management Microkernel (TMM). The Session Ticket option is disabled by default. En F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM y WebSafe 12.1.0 hasta la 12.1.2, ciertos valores en una negociación abreviada TLS al emplear un perfil de cliente SSL con la opción Session Ticket habilitada pueden causar la interrupción del servicio al Traffic Management Microkernel (TMM). Por defecto, la opción Session Ticket está deshabilitada. • https://support.f5.com/csp/article/K21154730 • CWE-20: Improper Input Validation •