cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-41787,https://securityvulnerability.io/vulnerability/CVE-2022-41787,BIG-IP DNS Express vulnerability CVE-2022-41787,"In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and 13.1.x before 13.1.5.1, when DNS profile is configured on a virtual server with DNS Express enabled, undisclosed DNS queries with DNSSEC can cause TMM to terminate.",F5,"Big-ip Dns,Big-ip Ltm",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-33947,https://securityvulnerability.io/vulnerability/CVE-2022-33947,BIG-IP DNS TMUI Vulnerability CVE-2022-33947,"In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, a vulnerability exists in undisclosed pages of the BIG-IP DNS Traffic Management User Interface (TMUI) that allows an authenticated attacker with at least operator role privileges to cause the Tomcat process to restart and perform unauthorized DNS requests and operations through undisclosed requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",F5,Big-ip Dns,5.4,MEDIUM,0.0008099999977275729,false,,false,false,false,,,false,false,,2022-08-04T18:15:00.000Z,0 CVE-2022-23013,https://securityvulnerability.io/vulnerability/CVE-2022-23013,DOM-Based Cross-Site Scripting Vulnerability in BIG-IP DNS & GTM by F5 Networks,"A DOM-based cross-site scripting (XSS) vulnerability has been identified in the BIG-IP Configuration utility of F5 Networks’ BIG-IP DNS and GTM products. This vulnerability enables an attacker to execute malicious JavaScript code within the context of the browser session of an authenticated user, potentially leading to unauthorized access and data manipulation. It affects specific versions of the software, with older versions reaching an end of technical support not being evaluated for this issue.",F5,Big-ip Dns & Gtm,8.8,HIGH,0.0019499999471008778,false,,false,false,false,,,false,false,,2022-01-25T19:11:24.000Z,0 CVE-2021-23032,https://securityvulnerability.io/vulnerability/CVE-2021-23032,Denial of Service Vulnerability in F5 BIG-IP DNS,"This vulnerability affects the F5 BIG-IP DNS, where non-default Wide IP and pool settings may lead to undisclosed DNS responses that can cause the Traffic Management Microkernel (TMM) to terminate unexpectedly. This scenario can create a denial of service, impacting the availability of DNS services for users. Organizations should ensure they are running the latest supported versions to mitigate this issue. Note that software versions that have reached End of Technical Support (EoTS) are not evaluated for this vulnerability.",F5,Big-ip Dns,7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2021-09-14T17:40:36.000Z,0 CVE-2021-22982,https://securityvulnerability.io/vulnerability/CVE-2021-22982,Buffer Overflow in BIG-IP DNS and GTM by F5 Networks,"A buffer overflow vulnerability exists in the BIG-IP DNS and GTM platforms on specific versions, where the big3d component fails to securely handle and parse certain payloads. This oversight could potentially allow an attacker to exploit this vulnerability to compromise the system's integrity. It's crucial for organizations using affected versions to assess their security measures and apply any necessary patches or mitigations, as systems in End of Software Development (EoSD) are not included in evaluation efforts.",F5,Big-ip Dns And Gtm,7.2,HIGH,0.0009599999757483602,false,,false,false,false,,,false,false,,2021-02-12T17:46:11.000Z,0 CVE-2020-27717,https://securityvulnerability.io/vulnerability/CVE-2020-27717,Denial of Service in BIG-IP DNS by F5 Networks,"On specific versions of BIG-IP DNS software, a sequence of unresolved DNS requests can lead to a crash of the Traffic Management Microkernel (TMM), resulting in unintended restarts and possible generation of core files. This behavior can disrupt services and has implications for system availability, making it crucial for users to evaluate their configurations and apply necessary mitigation measures.",F5,Big-ip Dns,7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-12-24T15:11:59.000Z,0 CVE-2020-27725,https://securityvulnerability.io/vulnerability/CVE-2020-27725,Memory Leak Vulnerability in F5 BIG-IP DNS and Related Products,"A memory leak occurs in F5's BIG-IP DNS and related products that could be exploited when users with access to TMSH, iControl, or SNMP services list DNS zones. This flaw allows potentially sensitive information regarding DNS zone data to be leaked, raising concerns about data exposure and system integrity.",F5,"Big-ip Dns, Gtm, And Link Controller",4.3,MEDIUM,0.0007200000109151006,false,,false,false,false,,,false,false,,2020-12-24T15:01:46.000Z,0 CVE-2020-27721,https://securityvulnerability.io/vulnerability/CVE-2020-27721,DNS Response Disruption in F5 BIG-IP DNS and LTM,"In specific versions of the F5 BIG-IP DNS and BIG-IP LTM, a configuration error may prevent the DNS system from utilizing a designated BIG-IP LTM virtual server for DNS responses under certain conditions, potentially leading to service interruptions.",F5,Big-ip Gtm & Dns,7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-12-24T14:52:59.000Z,0 CVE-2020-5935,https://securityvulnerability.io/vulnerability/CVE-2020-5935,MQTT Traffic Vulnerability in BIG-IP Products by F5 Networks,"A vulnerability exists in the F5 BIG-IP product line that can result in core file generation when handling MQTT traffic. Specifically, this issue arises when utilizing an MQTT profile alongside an iRule that manipulates the traffic on a BIG-IP virtual server. Affected versions include 15.1.0 through 15.1.0.5, as well as earlier versions such as 14.1.0 through 14.1.2.3 and 13.1.0 through 13.1.3.3. This could potentially impact the stability and performance of systems that rely on the BIG-IP platform for managing MQTT traffic.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Fps, Gtm, Link Controller, Pem)",5.9,MEDIUM,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-10-29T15:07:59.000Z,0 CVE-2019-6657,https://securityvulnerability.io/vulnerability/CVE-2019-6657,Reflected Cross-Site Scripting in F5 BIG-IP Traffic Management User Interface,"A reflected cross-site scripting vulnerability exists in an undisclosed page of the F5 BIG-IP Traffic Management User Interface (TMUI), which may allow an attacker to execute arbitrary scripts in the context of the user's browser session. This could lead to unauthorized actions being taken on behalf of a user or the disclosure of sensitive information. Users are advised to apply the necessary updates and patches to mitigate this security risk.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",6.1,MEDIUM,0.0007800000021234155,false,,false,false,false,,,false,false,,2019-11-01T14:53:06.000Z,0 CVE-2019-6618,https://securityvulnerability.io/vulnerability/CVE-2019-6618,File System Modification Vulnerability in BIG-IP by F5 Networks,"Users with the Resource Administrator role in certain versions of BIG-IP can gain unauthorized access to sensitive areas of the filesystem if granted Advanced Shell Access. This includes the ability to edit critical files such as /etc/passwd, potentially enabling malicious modifications to user objects and violating the inherent restrictions associated with the Resource Administrator role.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",4.9,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2019-05-03T19:28:54.000Z,0 CVE-2019-6617,https://securityvulnerability.io/vulnerability/CVE-2019-6617,Sensitive File Overwrite Vulnerability in BIG-IP by F5 Networks,"On certain versions of BIG-IP by F5 Networks, users assigned the Resource Administrator role can exploit a vulnerability that allows them to overwrite sensitive low-level files, such as '/etc/passwd', using SFTP. This occurs without requiring Advanced Shell access, which contravenes the defined restrictions for the Resource Administrator role. This flaw exposes critical system files to unauthorized modifications, potentially leading to unauthorized access and privilege escalation.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",6.5,MEDIUM,0.001180000021122396,false,,false,false,false,,,false,false,,2019-05-03T19:16:02.000Z,0 CVE-2019-6616,https://securityvulnerability.io/vulnerability/CVE-2019-6616,File Overwrite Vulnerability in BIG-IP by F5 Networks,"The vulnerability allows administrative users with TMSH access on specific versions of F5 BIG-IP to overwrite critical system files. This could potentially lead to the circumvention of established whitelist and blacklist controls, adversely affecting the security posture of the appliance. Organizations utilizing these affected versions should assess their systems for risk and apply appropriate security measures.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",7.2,HIGH,0.0014400000218302011,false,,false,false,false,,,false,false,,2019-05-03T19:12:57.000Z,0 CVE-2019-6614,https://securityvulnerability.io/vulnerability/CVE-2019-6614,Arbitrary File Overwrite Vulnerability in F5 BIG-IP Products,"The F5 BIG-IP platform allows high-privileged authenticated attackers to exploit insufficient protections in Appliance Mode. Specifically, versions 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4 are affected. When successfully exploited, this vulnerability enables attackers to overwrite arbitrary system files, potentially leading to a complete compromise of the affected system. This flaw arises due to internal mechanisms failing to adequately prevent such file operations.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",6.5,MEDIUM,0.0007200000109151006,false,,false,false,false,,,false,false,,2019-05-03T19:09:12.000Z,0 CVE-2019-6615,https://securityvulnerability.io/vulnerability/CVE-2019-6615,Access Control Bypass in BIG-IP by F5 Networks,"A vulnerability exists in F5 Networks' BIG-IP systems, where the Administrator and Resource Administrator roles can exploit TMSH access. This flaw allows for bypassing restrictions imposed by Appliance Mode in specific versions of BIG-IP. Administrators must ensure that systems are adequately secured to prevent unauthorized access through this vulnerability.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",4.9,MEDIUM,0.0005499999970197678,false,,false,false,false,,,false,false,,2019-05-03T19:05:20.000Z,0 CVE-2019-6613,https://securityvulnerability.io/vulnerability/CVE-2019-6613,SNMP Vulnerability in BIG-IP Products by F5 Networks,"A vulnerability exists in F5 Networks BIG-IP products where SNMP may inadvertently expose sensitive configuration objects. This issue affects multiple versions and arises when a passphrase is applied to various profile types accessed via SNMPv2, leading to potential unauthorized access to critical network configurations over unencrypted transmission channels.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",5.3,MEDIUM,0.0006200000061653554,false,,false,false,false,,,false,false,,2019-05-03T18:00:17.000Z,0 CVE-2019-6612,https://securityvulnerability.io/vulnerability/CVE-2019-6612,TCP Connection Issue in F5 BIG-IP DNS Cache,"A vulnerability affecting certain versions of F5 BIG-IP can lead to an unexpected restart of the Traffic Management Microkernel (TMM) when DNS query TCP connections are terminated before a response is received from the DNS cache. This issue occurs in specific versions, impacting the stability and performance of network operations reliant on DNS. Proper patching and configuration adjustments are recommended to mitigate this risk.",F5,"Big-ip (ltm, Aam, Afm, Apm, Asm, Dns, Gtm, Link Controller, Pem)",7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2019-05-03T17:56:16.000Z,0 CVE-2019-6611,https://securityvulnerability.io/vulnerability/CVE-2019-6611,Incorrect Logic Execution in BIG-IP Systems due to PPTP VPN Traffic Processing,"The vulnerability in certain versions of F5 BIG-IP systems arises when processing specific rare data sequences in PPTP VPN traffic. This anomaly can lead to incorrect logic execution, potentially causing the Traffic Management Microkernel (TMM) to restart unexpectedly and create a core file. Systems provisioned with the Carrier Grade NAT (CGNAT) module and configured with a PPTP profile are particularly susceptible to this issue.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",7.5,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2019-05-03T17:47:56.000Z,0 CVE-2019-6610,https://securityvulnerability.io/vulnerability/CVE-2019-6610,Denial of Service Vulnerability in F5 BIG-IP Products,"A denial of service vulnerability exists in F5 BIG-IP systems that allows an attacker to disrupt service by exploiting weaknesses in URL classification. Specifically, the affected versions may become unresponsive during certain operations, impacting the availability of services dependent on these products.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",8.6,HIGH,0.0010499999625608325,false,,false,false,false,,,false,false,,2019-04-11T17:09:12.000Z,0 CVE-2019-6600,https://securityvulnerability.io/vulnerability/CVE-2019-6600,Cross-Site Scripting Vulnerability in F5 BIG-IP Products,"In specific versions of F5 BIG-IP, when remote authentication is enabled for administrative users and external users are assigned the 'guest' role, there is a potential for unsanitized values to be reflected back to the client through the login page. This susceptibility can expose unauthenticated clients to cross-site scripting attacks, allowing attackers to execute arbitrary scripts in the context of a user's session, which can result in unauthorized actions and sensitive data exposure.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",6.1,MEDIUM,0.000699999975040555,false,,false,false,false,,,false,false,,2019-03-11T00:00:00.000Z,0 CVE-2019-6598,https://securityvulnerability.io/vulnerability/CVE-2019-6598,Traffic Management User Interface Vulnerability in F5 BIG-IP,"In the F5 BIG-IP version range of 11.5.1 to 14.0.0.2, a vulnerability exists in the Traffic Management User Interface (TMUI) that allows authenticated users to submit malformed requests. This can lead to a disruption of TMUI services. Users with any role except the No Access role can exploit this vulnerability, as they possess sufficient access rights to perform the attack on the TMUI.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe); Enterprise Manager",4.3,MEDIUM,0.0007099999929778278,false,,false,false,false,,,false,false,,2019-03-11T00:00:00.000Z,0 CVE-2019-6597,https://securityvulnerability.io/vulnerability/CVE-2019-6597,Command Restriction Flaw in BIG-IP Configuration Utility by F5 Networks,"A command restriction flaw exists in F5 Networks’ BIG-IP where authenticated administrative users can execute unauthorized commands through the Traffic Management User Interface (TMUI). This vulnerability may lead to unintended administrative access and manipulation of system settings, compromising the security posture of the application and potentially exposing sensitive data or configurations.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator); Enterprise Manager",7.2,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2019-03-11T00:00:00.000Z,0 CVE-2019-6593,https://securityvulnerability.io/vulnerability/CVE-2019-6593,,"On BIG-IP 11.5.1-11.5.4, 11.6.1, and 12.1.0, a virtual server configured with a Client SSL profile may be vulnerable to a chosen ciphertext attack against CBC ciphers. When exploited, this may result in plaintext recovery of encrypted messages through a man-in-the-middle (MITM) attack, despite the attacker not having gained access to the server's private key itself. (CVE-2019-6593 also known as Zombie POODLE and GOLDENDOODLE.)",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",5.9,MEDIUM,0.0012799999676644802,false,,false,false,false,,,false,false,,2019-02-26T00:00:00.000Z,0 CVE-2019-6594,https://securityvulnerability.io/vulnerability/CVE-2019-6594,,"On BIG-IP 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, and 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP) does not protect against multiple zero length DATA_FINs in the reassembly queue, which can lead to an infinite loop in some circumstances.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",5.9,MEDIUM,0.0010499999625608325,false,,false,false,false,,,false,false,,2019-02-26T00:00:00.000Z,0 CVE-2019-6592,https://securityvulnerability.io/vulnerability/CVE-2019-6592,,"On BIG-IP 14.1.0-14.1.0.1, TMM may restart and produce a core file when validating SSL certificates in client SSL or server SSL profiles.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Fps, Gtm, Link Controller, Pem, Webaccelerator)",9.1,CRITICAL,0.0011599999852478504,false,,false,false,false,,,false,false,,2019-02-26T00:00:00.000Z,0