cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-6615,https://securityvulnerability.io/vulnerability/CVE-2019-6615,,"On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, Administrator and Resource Administrator roles might exploit TMSH access to bypass Appliance Mode restrictions on BIG-IP systems.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",4.9,MEDIUM,0.0005499999970197678,false,false,false,false,,false,false,2019-05-03T19:05:20.000Z,0 CVE-2019-6598,https://securityvulnerability.io/vulnerability/CVE-2019-6598,,"In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.1-11.6.3.2, or 11.5.1-11.5.8 or Enterprise Manager 3.1.1, malformed requests to the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, may lead to disruption of TMUI services. This attack requires an authenticated user with any role (other than the No Access role). The No Access user role cannot login and does not have the access level to perform the attack.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe); Enterprise Manager",4.3,MEDIUM,0.0007099999929778278,false,false,false,false,,false,false,2019-03-11T00:00:00.000Z,0 CVE-2018-15322,https://securityvulnerability.io/vulnerability/CVE-2018-15322,,"On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.2.1-11.5.6, BIG-IQ Centralized Management 6.0.0-6.0.1, 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, iWorkflow 2.0.1-2.3.0, or Enterprise Manager 3.1.1 a BIG-IP user granted with tmsh access may cause the BIG-IP system to experience denial-of-service (DoS) when the BIG-IP user uses the tmsh utility to run the edit cli preference command and proceeds to save the changes to another filename repeatedly. This action utilises storage space on the /var partition and when performed repeatedly causes the /var partition to be full.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe), Big-iq Centralized Management, Big-iq Cloud And Orchestration, Iworkflow, Enterprise Manager",6.5,MEDIUM,0.0007200000109151006,false,false,false,false,,false,false,2018-10-31T14:00:00.000Z,0 CVE-2018-5527,https://securityvulnerability.io/vulnerability/CVE-2018-5527,,"On BIG-IP 13.1.0-13.1.0.7, a remote attacker using undisclosed methods against virtual servers configured with a Client SSL or Server SSL profile that has the SSL Forward Proxy feature enabled can force the Traffic Management Microkernel (tmm) to leak memory. As a result, system memory usage increases over time, which may eventually cause a decrease in performance or a system reboot due to memory exhaustion.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",7.5,HIGH,0.001120000029914081,false,false,false,false,,false,false,2018-06-27T00:00:00.000Z,0 CVE-2018-5522,https://securityvulnerability.io/vulnerability/CVE-2018-5522,,"On F5 BIG-IP 13.0.0, 12.0.0-12.1.2, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, when processing DIAMETER transactions with carefully crafted attribute-value pairs, TMM may crash.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",5.9,MEDIUM,0.001069999998435378,false,false,false,false,,false,false,2018-06-01T14:29:00.000Z,0 CVE-2018-5513,https://securityvulnerability.io/vulnerability/CVE-2018-5513,,"On F5 BIG-IP 13.1.0-13.1.0.3, 13.0.0, 12.1.0-12.1.3.3, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, a malformed TLS handshake causes TMM to crash leading to a disruption of service. This issue is only exposed on the data plane when Proxy SSL configuration is enabled. The control plane is not impacted by this issue.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",7.5,HIGH,0.001069999998435378,false,false,false,false,,false,false,2018-06-01T14:29:00.000Z,0 CVE-2018-5515,https://securityvulnerability.io/vulnerability/CVE-2018-5515,,"On F5 BIG-IP 13.0.0-13.1.0.5, using RADIUS authentication responses from a RADIUS server with IPv6 addresses may cause TMM to crash, leading to a failover event.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",4.4,MEDIUM,0.001290000043809414,false,false,false,false,,false,false,2018-05-02T13:29:00.000Z,0 CVE-2018-5519,https://securityvulnerability.io/vulnerability/CVE-2018-5519,,"On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any user when licensed for Appliance Mode), this allows more permissive file access than intended.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",4.9,MEDIUM,0.0005499999970197678,false,false,false,false,,false,false,2018-05-02T13:29:00.000Z,0 CVE-2018-5520,https://securityvulnerability.io/vulnerability/CVE-2018-5520,,"On an F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.1, or 11.2.1-11.6.3.1 system configured in Appliance mode, the TMOS Shell (tmsh) may allow an administrative user to use the dig utility to gain unauthorized access to file system resources.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",4.4,MEDIUM,0.000590000010561198,false,false,false,false,,false,false,2018-05-02T13:29:00.000Z,0 CVE-2018-5512,https://securityvulnerability.io/vulnerability/CVE-2018-5512,,"On F5 BIG-IP 13.1.0-13.1.0.5, when Large Receive Offload (LRO) and SYN cookies are enabled (default settings), undisclosed traffic patterns may cause TMM to restart.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",7.5,HIGH,0.0020800000056624413,false,false,false,false,,false,false,2018-05-02T13:29:00.000Z,0 CVE-2018-5518,https://securityvulnerability.io/vulnerability/CVE-2018-5518,,"On F5 BIG-IP 13.0.0-13.1.0.5 or 12.0.0-12.1.3.3, malicious root users with access to a VCMP guest can cause a disruption of service on adjacent VCMP guests running on the same host. Exploiting this vulnerability causes the vCMPd process on the adjacent VCMP guest to restart and produce a core file. This issue is only exploitable on a VCMP guest which is operating in ""host-only"" or ""bridged"" mode. VCMP guests which are ""isolated"" are not impacted by this issue and do not provide mechanism to exploit the vulnerability. Guests which are deployed in ""Appliance Mode"" may be impacted however the exploit is not possible from an Appliance Mode guest. To exploit this vulnerability root access on a guest system deployed as ""host-only"" or ""bridged"" mode is required.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",5.4,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2018-05-02T13:29:00.000Z,0 CVE-2018-5517,https://securityvulnerability.io/vulnerability/CVE-2018-5517,,"On F5 BIG-IP 13.1.0-13.1.0.5, malformed TCP packets sent to a self IP address or a FastL4 virtual server may cause an interruption of service. The control plane is not exposed to this issue. This issue impacts the data plane virtual servers and self IPs.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",7.5,HIGH,0.001069999998435378,false,false,false,false,,false,false,2018-05-02T13:29:00.000Z,0 CVE-2018-5516,https://securityvulnerability.io/vulnerability/CVE-2018-5516,,"On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.2, or 11.2.1-11.6.3.1, Enterprise Manager 3.1.1, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, or F5 iWorkflow 2.0.2-2.3.0, authenticated users granted TMOS Shell (tmsh) access can access objects on the file system which would normally be disallowed by tmsh restrictions. This allows for authenticated, low privileged attackers to exfiltrate objects on the file system which should not be allowed.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe),Enterprise Manager,Big-iq Centralized Management,Big-iq Cloud And Orchestration,Iworkflow",4.7,MEDIUM,0.0004900000058114529,false,false,false,false,,false,false,2018-05-02T13:29:00.000Z,0 CVE-2018-5506,https://securityvulnerability.io/vulnerability/CVE-2018-5506,,"In F5 BIG-IP 13.0.0, 12.1.0-12.1.2, 11.6.1, 11.5.1-11.5.5, or 11.2.1 the Apache modules apache_auth_token_mod and mod_auth_f5_auth_token.cpp allow possible unauthenticated bruteforce on the em_server_ip authorization parameter to obtain which SSL client certificates used for mutual authentication between BIG-IQ or Enterprise Manager (EM) and managed BIG-IP devices.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",9.8,CRITICAL,0.0016599999507889152,false,false,false,false,,false,false,2018-04-13T13:29:00.000Z,0 CVE-2017-6156,https://securityvulnerability.io/vulnerability/CVE-2017-6156,,"When the F5 BIG-IP 12.1.0-12.1.1, 11.6.0-11.6.1, 11.5.1-11.5.5, or 11.2.1 system is configured with a wildcard IPSec tunnel endpoint, it may allow a remote attacker to disrupt or impersonate the tunnels that have completed phase 1 IPSec negotiations. The attacker must possess the necessary credentials to negotiate the phase 1 of the IPSec exchange to exploit this vulnerability; in many environment this limits the attack surface to other endpoints under the same administration.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",6.4,MEDIUM,0.0012100000167265534,false,false,false,false,,false,false,2018-04-13T13:29:00.000Z,0 CVE-2017-6158,https://securityvulnerability.io/vulnerability/CVE-2017-6158,,"In F5 BIG-IP 12.0.0-12.1.2, 11.6.0-11.6.1, 11.5.1-11.5.5, or 11.2.1 there is a vulnerability in TMM related to handling of invalid IP addresses.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",6.5,MEDIUM,0.0010499999625608325,false,false,false,false,,false,false,2018-04-13T13:29:00.000Z,0 CVE-2018-5507,https://securityvulnerability.io/vulnerability/CVE-2018-5507,,"On F5 BIG-IP versions 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5, vCMP guests running on VIPRION 2100, 4200 and 4300 series blades cannot correctly decrypt ciphertext from established SSL sessions with small MTU.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",7.5,HIGH,0.0018599999602884054,false,false,false,false,,false,false,2018-04-13T13:29:00.000Z,0 CVE-2018-5511,https://securityvulnerability.io/vulnerability/CVE-2018-5511,,"On F5 BIG-IP 13.1.0-13.1.0.3 or 13.0.0, when authenticated administrative users execute commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",7.2,HIGH,0.022600000724196434,false,false,false,false,,false,false,2018-04-13T13:29:00.000Z,0 CVE-2018-5510,https://securityvulnerability.io/vulnerability/CVE-2018-5510,,"On F5 BIG-IP 11.5.4 HF4-11.5.5, the Traffic Management Microkernel (TMM) may restart when processing a specific sequence of packets on IPv6 virtual servers.",F5,"Big-ip (analytics, Ltm, Aam, Afm, Apm, Asm, Dns, Edge, Gateway, Gtm Link Controller, Pem, Webaccelerator, Websafe)",7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2018-04-13T13:29:00.000Z,0 CVE-2018-5502,https://securityvulnerability.io/vulnerability/CVE-2018-5502,,"On F5 BIG-IP versions 13.0.0 - 13.1.0.3, attackers may be able to disrupt services on the BIG-IP system with maliciously crafted client certificate. This vulnerability affects virtual servers associated with Client SSL profile which enables the use of client certificate authentication. Client certificate authentication is not enabled by default in Client SSL profile. There is no control plane exposure.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",7.5,HIGH,0.0008099999977275729,false,false,false,false,,false,false,2018-03-22T18:29:00.000Z,0 CVE-2018-5504,https://securityvulnerability.io/vulnerability/CVE-2018-5504,,"In some circumstances, the Traffic Management Microkernel (TMM) does not properly handle certain malformed Websockets requests/responses, which allows remote attackers to cause a denial-of-service (DoS) or possible remote code execution on the F5 BIG-IP system running versions 13.0.0 - 13.1.0.3 or 12.1.0 - 12.1.3.1.",F5,"Big-ip (ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe)",8.1,HIGH,0.009209999814629555,false,false,false,false,,false,false,2018-03-22T18:29:00.000Z,0 CVE-2018-5500,https://securityvulnerability.io/vulnerability/CVE-2018-5500,,"On F5 BIG-IP systems running 13.0.0, 12.1.0 - 12.1.3.1, or 11.6.1 - 11.6.2, every Multipath TCP (MCTCP) connection established leaks a small amount of memory. Virtual server using TCP profile with Multipath TCP (MCTCP) feature enabled will be affected by this issue.",F5,"Big-ip Ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe",5.9,MEDIUM,0.0008099999977275729,false,false,false,false,,false,false,2018-03-01T16:29:00.000Z,0 CVE-2018-5501,https://securityvulnerability.io/vulnerability/CVE-2018-5501,,"In some circumstances, on F5 BIG-IP systems running 13.0.0, 12.1.0 - 12.1.3.1, any 11.6.x or 11.5.x release, or 11.2.1, TCP DNS profile allows excessive buffering due to lack of flow control.",F5,"Big-ip Ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Edge Gateway, Gtm, Link Controller, Pem, Webaccelerator, Websafe",5.9,MEDIUM,0.0008099999977275729,false,false,false,false,,false,false,2018-03-01T16:29:00.000Z,0 CVE-2017-6135,https://securityvulnerability.io/vulnerability/CVE-2017-6135,,"In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and WebSafe software version 13.0.0, a slow memory leak as a result of undisclosed IPv4 or IPv6 packets sent to BIG-IP management port or self IP addresses may lead to out of memory (OOM) conditions.",F5,"Big-ip Ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Gtm, Link Controller, Pem, Websafe",7.5,HIGH,0.0008099999977275729,false,false,false,false,,false,false,2017-12-21T17:29:00.000Z,0 CVE-2017-6134,https://securityvulnerability.io/vulnerability/CVE-2017-6134,,"In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and WebSafe software version 13.0.0, 12.1.0 - 12.1.2 and 11.5.1 - 11.6.1, an undisclosed sequence of packets, sourced from an adjacent network may cause TMM to crash.",F5,"Big-ip Ltm, Aam, Afm, Analytics, Apm, Asm, Dns, Gtm, Link Controller, Pem, Websafe",6.5,MEDIUM,0.0013200000394135714,false,false,false,false,,false,false,2017-12-21T17:29:00.000Z,0