cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-5947,https://securityvulnerability.io/vulnerability/CVE-2020-5947,TCP Sequence Number Exposure in F5 BIG-IP Products,"In specific versions of F5 BIG-IP systems, attackers might exploit a flaw that allows them to retrieve TCP sequence numbers. This can lead to potential reuse of these numbers in subsequent connections, targeting the same source and destination IP addresses and ports. The affected BIG-IP platforms stand vulnerable to unauthorized access, enabling malicious actors to compromise the integrity of network communications. Users of the impacted models should take immediate action to mitigate potential risks and apply available patches.",F5,"Big-ip 2000 Series (c112), Big-ip 4000 Series (c113), Big-ip I2000 Series (c117), Big-ip I4000 Series (c115), Big-ip Virtual Edition (ve)",4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2020-11-19T00:14:19.000Z,0 CVE-2020-5939,https://securityvulnerability.io/vulnerability/CVE-2020-5939,Traffic Management Microkernel Vulnerability in F5 BIG-IP Virtual Edition,"In specific versions of F5 BIG-IP Virtual Edition systems running on VMware, an issue arises when utilizing an Intel-based 85299 Network Interface Controller (NIC) card with Single Root I/O Virtualization (SR-IOV) enabled in vSphere. This vulnerability can cause the Traffic Management Microkernel (TMM) to fail, resulting in an inability to transmit traffic. This could potentially disrupt network services and affect overall system performance.",F5,Big-ip Virtual Edition (ve),7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-11-05T19:14:16.000Z,0 CVE-2020-5888,https://securityvulnerability.io/vulnerability/CVE-2020-5888,Access Control Bypass in F5 BIG-IP Virtual Edition,"F5 BIG-IP Virtual Edition versions 15.1.0 through 15.1.0.1, 15.0.0 through 15.0.1.2, and 14.1.0 through 14.1.2.3 are vulnerable to an access control bypass issue. This vulnerability allows adjacent network attackers to potentially access local daemons and circumvent port lockdown settings, posing serious risks to network security. It is important for organizations using affected versions to apply security patches and implement protective measures.",F5,Big-ip Ve,8.1,HIGH,0.0006900000153109431,false,,false,false,false,,,false,false,,2020-04-30T21:04:52.000Z,0 CVE-2020-5887,https://securityvulnerability.io/vulnerability/CVE-2020-5887,Remote Access Vulnerability in BIG-IP Virtual Edition by F5 Networks,"Versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3 of F5's BIG-IP Virtual Edition may allow remote attackers to exploit a flaw that permits the unauthorized access to local daemons, potentially compromising the security configuration intended by port lockdown settings.",F5,Big-ip Ve,9.1,CRITICAL,0.004579999949783087,false,,false,false,false,,,false,false,,2020-04-30T20:43:51.000Z,0 CVE-2020-5881,https://securityvulnerability.io/vulnerability/CVE-2020-5881,Network Device Abstraction Layer Vulnerability in F5 BIG-IP Virtual Edition,"In specific versions of F5's BIG-IP Virtual Edition, a vulnerability exists when VLAN groups are configured alongside devices using OSPF. This flaw can cause the Network Device Abstraction Layer (NDAL) interfaces to become unresponsive. Consequently, this disruption affects the communication between critical processes such as mcpd and tmm, potentially leading to service interruptions and degraded network performance.",F5,Big-ip Ve,7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-04-30T20:39:57.000Z,0 CVE-2020-5878,https://securityvulnerability.io/vulnerability/CVE-2020-5878,Traffic Management Microkernel Vulnerability on BIG-IP Virtual Edition by F5 Networks,"An issue exists in the Traffic Management Microkernel (TMM) of BIG-IP Virtual Edition, where it may unexpectedly restart while processing unconventional IP traffic. This issue affects specific versions, including 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.3, potentially leading to service interruptions. Immediate attention to these versions is recommended to mitigate the risk.",F5,Big-ip Ve,7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-04-30T20:24:29.000Z,0