Vulnerabilites related to f5 - big-ip_i5600
CVE-2020-5851 (GCVE-0-2020-5851)
Vulnerability from cvelistv5
Published
2020-01-14 15:03
Modified
2024-08-04 08:39
Severity ?
EPSS score ?
Summary
On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG
References
▼ | URL | Tags |
---|---|---|
https://support.f5.com/csp/article/K91171450 | x_refsource_CONFIRM |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T08:39:25.925Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K91171450", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "BIG-IP", vendor: "n/a", versions: [ { status: "affected", version: "Hotfix-BIGIP-14.1.0.2.0.45.4-ENG, Hotfix-BIGIP-14.1.0.2.0.62.4-ENG", }, ], }, ], descriptions: [ { lang: "en", value: "On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG", }, ], problemTypes: [ { descriptions: [ { description: "Compromise detection failure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-14T15:03:29", orgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", shortName: "f5", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K91171450", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "f5sirt@f5.com", ID: "CVE-2020-5851", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "BIG-IP", version: { version_data: [ { version_value: "Hotfix-BIGIP-14.1.0.2.0.45.4-ENG, Hotfix-BIGIP-14.1.0.2.0.62.4-ENG", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Compromise detection failure", }, ], }, ], }, references: { reference_data: [ { name: "https://support.f5.com/csp/article/K91171450", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K91171450", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", assignerShortName: "f5", cveId: "CVE-2020-5851", datePublished: "2020-01-14T15:03:29", dateReserved: "2020-01-06T00:00:00", dateUpdated: "2024-08-04T08:39:25.925Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2023-22839 (GCVE-0-2023-22839)
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2025-03-26 17:48
Severity ?
EPSS score ?
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T10:20:31.223Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://my.f5.com/manage/s/article/K37708118", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-22839", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-26T17:48:19.712757Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-26T17:48:26.847Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", modules: [ "DNS", "LTM enabled with DNS Services license", ], product: "BIG-IP", vendor: "F5", versions: [ { lessThan: "17.0.0.2", status: "affected", version: "17.0.0", versionType: "semver", }, { lessThan: "16.1.3.3", status: "affected", version: "16.1.0", versionType: "semver", }, { lessThan: "15.1.8.1", status: "affected", version: "15.1.0", versionType: "semver", }, { lessThan: "14.1.5.3", status: "affected", version: "14.1.0", versionType: "semver", }, { lessThan: "*", status: "affected", version: "13.1.0", versionType: "semver", }, ], }, ], datePublic: "2023-02-01T15:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br>", }, ], value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-01T17:56:26.064Z", orgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", shortName: "f5", }, references: [ { url: "https://my.f5.com/manage/s/article/K37708118", }, ], source: { discovery: "INTERNAL", }, title: "BIG-IP DNS profile vulnerability", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", assignerShortName: "f5", cveId: "CVE-2023-22839", datePublished: "2023-02-01T17:56:26.064Z", dateReserved: "2023-01-13T06:43:46.141Z", dateUpdated: "2025-03-26T17:48:26.847Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-11109 (GCVE-0-2019-11109)
Vulnerability from cvelistv5
Published
2019-12-18 21:09
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K54164678?utm_source=f5support&%3Butm_medium=RSS | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) SPS |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.655Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&%3Butm_medium=RSS", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) SPS", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-27T18:06:04", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&%3Butm_medium=RSS", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11109", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) SPS", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { name: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&utm_medium=RSS", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11109", datePublished: "2019-12-18T21:09:56", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.655Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-6140 (GCVE-0-2017-6140)
Vulnerability from cvelistv5
Published
2017-12-21 17:00
Modified
2024-09-17 04:04
Severity ?
EPSS score ?
Summary
On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1040042 | vdb-entry, x_refsource_SECTRACK | |
https://support.f5.com/csp/article/K55102452 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F5 Networks, Inc. | BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM, PEM |
Version: 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4 Version: 11.6.0, 11.6.1 Version: 12.0.0, 12.1.0, 12.1.1, 12.1.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:18:49.914Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1040042", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1040042", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K55102452", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM, PEM", vendor: "F5 Networks, Inc.", versions: [ { status: "affected", version: "11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4", }, { status: "affected", version: "11.6.0, 11.6.1", }, { status: "affected", version: "12.0.0, 12.1.0, 12.1.1, 12.1.2", }, ], }, ], datePublic: "2017-12-20T00:00:00", descriptions: [ { lang: "en", value: "On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-12-22T10:57:01", orgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", shortName: "f5", }, references: [ { name: "1040042", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1040042", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K55102452", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "f5sirt@f5.com", DATE_PUBLIC: "2017-12-20T00:00:00", ID: "CVE-2017-6140", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM, PEM", version: { version_data: [ { version_value: "11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4", }, { version_value: "11.6.0, 11.6.1", }, { version_value: "12.0.0, 12.1.0, 12.1.1, 12.1.2", }, ], }, }, ], }, vendor_name: "F5 Networks, Inc.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "1040042", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1040042", }, { name: "https://support.f5.com/csp/article/K55102452", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K55102452", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", assignerShortName: "f5", cveId: "CVE-2017-6140", datePublished: "2017-12-21T17:00:00Z", dateReserved: "2017-02-21T00:00:00", dateUpdated: "2024-09-17T04:04:09.104Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78198692-74E8-4289-B169-E64C1C50B71C", versionEndExcluding: "sps_e5_04.01.04.275.0", versionStartIncluding: "sps_e5_04.00.00.000.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5DFD2B64-3374-4419-B102-42745E051F14", versionEndExcluding: "sps_soc-a_04.00.04.191.0", versionStartIncluding: "sps_soc-a_04.00.00.000.0", vulnerable: true, }, { criteria: "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33CEC3A1-D09B-4157-9AC7-1160997ADE80", versionEndExcluding: "sps_soc-x_04.00.04.100.0", versionStartIncluding: "sps_soc-x_04.00.00.000.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_b2250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "58DB7299-1600-4868-A270-D4044889524B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_b2250:-:*:*:*:*:*:*:*", matchCriteriaId: "2D2CC5DE-7FAA-4987-BCF2-CB365CFE0C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_b4300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "59F24979-7D0A-4BA9-85B2-D9DAF129C11D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_b4300:-:*:*:*:*:*:*:*", matchCriteriaId: "8912E078-E8DC-4587-8B2F-9DC45A18E3CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_b4340n_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "683F596C-FD78-4C8B-820A-CAA11463EE47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_b4340n:-:*:*:*:*:*:*:*", matchCriteriaId: "DCDABDC7-4229-4AC0-AC12-53DE4AD77C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_b4450n_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A07B4ABC-5C2C-4DC7-8983-DC6E0B090334", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_b4450n:-:*:*:*:*:*:*:*", matchCriteriaId: "62CBE6F1-89DA-4514-83EA-4721453F5C11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F510CA2D-E049-4884-AB80-EC03560556EF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*", matchCriteriaId: "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10050s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6EF6B375-272F-4F6B-A5F4-479EE809A89D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10050s:-:*:*:*:*:*:*:*", matchCriteriaId: "F74715E2-C704-4836-B2B3-FC89B1FC2C5E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10150v-n_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5FECA5AC-6B6F-4C38-AD52-B6228A050044", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10150v-n:-:*:*:*:*:*:*:*", matchCriteriaId: "48A33692-B2BF-4602-85B4-E4B75AD6BD1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10200v-s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E48DC368-92D5-49AB-BFB0-638FF4F4B6D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10200v-s:-:*:*:*:*:*:*:*", matchCriteriaId: "170C1520-13F7-466C-A485-63EE8745E9ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10250v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F305A2E-8CDC-400C-BAC0-1CE37AC30B0C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10250v:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6C9711-AFAE-4B01-BBAE-5499E4B3ED23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10350v-n_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BDFF2C7D-FC63-4044-9A70-130AE650140C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10350v-n:-:*:*:*:*:*:*:*", matchCriteriaId: "BEC3C68F-37C5-411E-8033-FDD4EF3DA339", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_12250v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D3004259-DA6B-4BE6-91C0-51594269A56B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_12250v:-:*:*:*:*:*:*:*", matchCriteriaId: "34177892-A95F-4512-ABA7-430526A2D1B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_2200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DB62EE4-943C-4279-BF38-C12B4563332F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_2200:-:*:*:*:*:*:*:*", matchCriteriaId: "A046243E-10EC-42F8-8311-B24E37106056", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "21BD097C-73F2-4EB7-9024-3DC63EC419D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A81F6A51-9AEF-4502-B19C-449CC9FA7154", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33D524EE-B941-4D73-A83F-02C3253492D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C53B31C-E56F-4FD4-9B51-A741DA8FE479", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E48A49B-586A-4585-8952-EBF30E8C726C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9A1D2B-33AA-4691-9891-4360B9B026EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "85EE39BF-86AA-498B-BF51-EDCD7BD01376", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "6C3B5688-0235-4D4F-A26C-440FF24A1B43", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "6FCB6C17-33AC-4E5E-8633-7490058CA51F", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "C8D4FBBA-1D87-4CCB-ADB3-42514FB0CF45", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "D6A53E3C-3E09-4100-8D5A-10AD4973C230", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "C6917369-D3C2-42EB-B73B-F86CE2F17401", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "151ED6D1-AA85-4213-8F3A-8167CBEC4721", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "6F1C68BC-A3EF-4205-AD00-68CB3A8C65AF", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "D8BBC028-03DD-4412-9180-883E4252E132", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "FCAE28C2-0ADD-4FD0-A520-EFB764164DD8", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "596A35D8-3644-4C45-99AC-4D201F170B83", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "5D5AA99B-08E7-4959-A3B4-41AA527B4B22", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "4AC8FD5C-AE1A-4484-BB6F-EBB6A48D21F8", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "EC15881B-9C49-4E77-9FB6-A6E60D0BCAD3", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "36A213C6-D6E4-4F38-989D-81D3DFC11829", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "AB5A624E-40A1-4F75-8B9A-FA56510C19EE", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "9DC86A5F-C793-4848-901F-04BFB57A07F6", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "0772A366-87B9-40EC-9F63-AE0FF0EF5002", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "3D4B5A46-AA7B-416F-BA97-76A0BA232C6F", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "59D9F39B-206B-4E76-A811-1CAA705A60EE", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "9BD61B6A-4E98-4D2C-92BC-FED15CEE39A6", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "2E5552A3-91CD-4B97-AD33-4F1FB4C8827A", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "8A53C692-D353-42E3-9148-F850DA11884F", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "05106312-E60D-4CF1-B4C8-6F1EF5AF8D75", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "70099A38-3B84-4C40-8590-BE6C8F7C21A7", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "A9A8A5C3-0C38-4F46-8F98-DC3B9C58D660", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "55C2EC23-E78F-4447-BACF-21FC36ABF155", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "A35AC237-573B-4309-87EF-3945FA2449BF", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "27ABD6A3-5D67-4543-BB90-602F17A98B52", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "1DE40473-ABAE-4D91-8EBB-FB5719E107F6", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "96E945EE-A623-4775-83B9-4CF81B7EA70F", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "945A19E8-51EB-42FE-9BF1-12DAC78B5286", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "0B6C3F50-BD60-4A8C-8DBB-680DA4D6BE6D", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "B1B2D963-4E55-45B5-80E0-BC6FFB2122F7", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "92484170-2E91-45F6-9789-B0DF3F5E6260", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "EB5007D0-BBDB-4D74-9C88-98FBA74757D1", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "FB07E847-6083-4CC8-8A62-6B9744B87088", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "D8BBD637-148A-4E1A-B2DC-129BCD121C1E", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "EF606356-8191-478D-AF60-D48A408CD9ED", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "0A16FE69-A466-4FA6-BDDA-794C9F2B36FD", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "B7725810-66D2-4460-A174-9F3BFAD966F2", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "0620AA57-83D1-41E6-8ABB-99F3FABB10F0", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "A93AAEB9-556E-4F94-ADEC-D9C294B7F37E", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "FA3E37E6-64B9-4668-AC01-933711E1C934", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "039E73A1-9F90-46A4-BFEE-5E97BAF3FAA6", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "EFD760FE-4347-4D36-B5C6-4009398060F2", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "BF552D91-612A-43E1-B2D6-02E2515FEA22", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "7C8D0EF7-9C65-4491-B358-DB1AAB0EA1FF", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "8CCD3CF9-EA9D-43FF-8ADA-713B4B5C468E", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "43581457-5C55-4B31-BEFA-4B59B2744BB8", versionEndIncluding: "11.6.5", versionStartIncluding: "11.5.2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "65B76F53-7D8B-477E-8B6E-91AC0A9009FF", versionEndIncluding: "12.1.5", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "6704F0A6-16E2-4C2D-B5BD-EDDEAD5C153C", versionEndIncluding: "13.1.3", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "79B0C4C9-FCA9-4108-B349-2EFBB4A1153B", versionEndIncluding: "14.1.2", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "EC6612AB-E46B-4A8B-9B3E-C711D8C27962", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.", }, { lang: "es", value: "Un problema lógico en el subsistema para Intel® SPS versiones anteriores a SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 y SPS_SoC-A_04.00.04.191.0, puede permitir a un usuario privilegiado habilitar potencialmente una denegación de servicio por medio de un acceso local.", }, ], id: "CVE-2019-11109", lastModified: "2024-11-21T04:20:33.233", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-18T22:15:13.127", references: [ { source: "secure@intel.com", url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&%3Butm_medium=RSS", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&%3Butm_medium=RSS", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-12-21 17:29
Modified
2024-11-21 03:29
Severity ?
Summary
On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | http://www.securitytracker.com/id/1040042 | Third Party Advisory, VDB Entry | |
f5sirt@f5.com | https://support.f5.com/csp/article/K55102452 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040042 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K55102452 | Issue Tracking, Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "E5D27D4A-BD5C-4FA9-AA72-F7956298DE06", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "12F86EB5-D581-4103-A802-44D968BA8D55", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "36F383ED-8CB5-400D-BFDB-BD5B8CD8C7AE", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "E6203A11-82C3-4ABA-94E9-085BFF1A0E4C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "06224D59-35F8-4168-80C5-CF5B17E99050", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*", matchCriteriaId: "2FF5A5F6-4BA3-4276-8679-B5560EACF2E0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*", matchCriteriaId: "A2B502F2-404C-463B-B6BE-87489DC881F9", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", matchCriteriaId: "44F1E5E0-BD63-4A4A-BC4E-A1D5495F8B5C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*", matchCriteriaId: "A82C7B1C-E195-4D94-B604-78FB464C4F81", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.1:*:*:*:*:*:*:*", matchCriteriaId: "8F6C3144-D0DE-4248-BFCD-04A7E6104044", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:*:*:*:*:*:*:*", matchCriteriaId: "0357B5ED-0600-4756-93E5-692987068596", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "0E3D8A24-0B8D-432B-8F06-D0E1642E7C1C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "A4489382-0668-4CFB-BA89-D54762937CEE", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "9850D0AA-B173-47B2-9B69-75E6D1FAF490", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "281D0B5B-27DF-4E8A-AFC9-D09468F8ECDF", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "40994EB4-4D31-4697-964D-1F0B09864DF2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*", matchCriteriaId: "E5B40837-EC2B-41FB-ACC3-806054EAF28C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.1:*:*:*:*:*:*:*", matchCriteriaId: "48BE0210-7058-462A-BA17-845D3E4F52FA", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", matchCriteriaId: "3CA2FA6B-3930-432F-8FB5-E73604CEFE42", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.0:*:*:*:*:*:*:*", matchCriteriaId: "ECA90FB8-E2CD-400F-B753-1B482E7FAC96", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.1:*:*:*:*:*:*:*", matchCriteriaId: "6FEC804B-35DB-4A0C-9AEA-15527E0CC1B1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:*:*:*:*:*:*:*", matchCriteriaId: "BEB228A9-0C01-4531-B2B2-38BB7B0E02E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "3755740D-F1DC-4910-ADDD-9D491515201C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "EA244A7D-F65D-4114-81C8-CE811959EA10", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "5EA9F72C-8344-4370-B511-31BEC8BA63E8", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "96CF015E-C74B-4215-9103-8087BC1D12AB", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "CFE4DB00-433D-414A-A1CE-E507B9BB809B", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*", matchCriteriaId: "B276E4DF-69FC-4158-B93A-781A45605034", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.1:*:*:*:*:*:*:*", matchCriteriaId: "CBAB92C5-2D50-49CC-AECA-0D16BC44A788", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", matchCriteriaId: "532AAF54-64EF-4852-B4F1-D5E660463704", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.0:*:*:*:*:*:*:*", matchCriteriaId: "BC827031-CA39-4081-8CE0-30EAC78DF756", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.1:*:*:*:*:*:*:*", matchCriteriaId: "7569903B-3A15-4A10-863B-6828337DD268", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:*:*:*:*:*:*:*", matchCriteriaId: "45825991-D17D-42F1-87B4-7DF86B098B45", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "A7D226F1-6513-4233-BE20-58D7AB24978F", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "B33B2082-E040-4799-A260-BA687ED8614E", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "A85766A4-2181-4719-ADCF-4FEA0031DB80", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "D2E93EE3-DB73-468E-87CA-4D277F283648", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "ADB01A61-1924-417F-8A75-9FDF8F14F754", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*", matchCriteriaId: "B70D2BD5-8E3F-4B57-84EF-3AF40F6378F1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:11.6.1:*:*:*:*:*:*:*", matchCriteriaId: "2A065BC0-56BD-4665-A860-EBA37F1A4D8C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", matchCriteriaId: "D0EDB8E9-E6FB-406E-B1D3-C620F114804C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:12.1.0:*:*:*:*:*:*:*", matchCriteriaId: "77192AFB-B612-4BAA-916C-3DF8E851CC2B", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:12.1.1:*:*:*:*:*:*:*", matchCriteriaId: "AE295AF6-2B35-467F-8501-B5753CDDE16C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:12.1.2:*:*:*:*:*:*:*", matchCriteriaId: "E3C03B68-914F-4DB0-A832-B626B8746524", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "1AD2C1D2-103E-4B0F-84AA-999F01E695F0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "855E91A4-0A0C-4E5C-8019-FB513A793803", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "FCCC2092-E109-4FF6-9B85-6C9434269851", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "8923BB93-96C1-417B-9172-4A81E731EBA2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "274E34BF-82A5-4D9E-BC72-202193A47A5A", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*", matchCriteriaId: "475F0EF8-42CB-4099-9C4A-390F946C4924", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.1:*:*:*:*:*:*:*", matchCriteriaId: "94DBCD7A-E4DA-4C08-87A4-960CF53A83E6", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", matchCriteriaId: "62B0A70A-D101-443E-A543-5EC35E23D66F", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.0:*:*:*:*:*:*:*", matchCriteriaId: "2DB2118A-0F9C-4273-BB07-85FEA32C785B", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.1:*:*:*:*:*:*:*", matchCriteriaId: "8541C9EF-69A8-4641-B173-3BCE0EDD20A8", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:*:*:*:*:*:*:*", matchCriteriaId: "E24A3C71-0075-4738-B114-267337D050CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "E142B175-0E9D-4051-A6B1-FF9E7583DFBA", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "9B131043-3C02-47CE-8D1C-BB29A20113E5", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "DCE4ACE8-1309-4631-9E34-A6032009B702", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "A70560C5-AEB5-4144-A0AA-10A63527B5C1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "8F2CE884-45CD-4EB8-8568-B3AEAB017361", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.6.0:*:*:*:*:*:*:*", matchCriteriaId: "0EAEC7D0-4BE1-42EE-91CA-56204FEAD048", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:11.6.1:*:*:*:*:*:*:*", matchCriteriaId: "510C2966-F495-49BB-99D6-53468FD95832", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:12.0.0:*:*:*:*:*:*:*", matchCriteriaId: "FE97E4B1-88D7-4B3E-BEA3-0AD2A01347FC", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:12.1.0:*:*:*:*:*:*:*", matchCriteriaId: "F2E3AE25-2F4F-4CE5-8842-E02346162D7D", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:12.1.1:*:*:*:*:*:*:*", matchCriteriaId: "4CCC6CA6-2BE8-40D4-AC55-94AF8F5BEDF9", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_dns:12.1.2:*:*:*:*:*:*:*", matchCriteriaId: "62FE0213-787C-49CB-96B8-EAC9DE0977EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "0594DBC5-8470-416C-A5EA-E04F5AB2C799", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "B50BF19F-71B4-47C0-A96E-6EB90FCC6AE7", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "BD3A3BA6-6F60-45CA-8F52-687B671B077A", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "202B6870-718C-4F8D-9BAB-7ED6385BF2A7", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "EC6A3691-ADC4-44BC-8A11-D855B13EF128", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*", matchCriteriaId: "D7D7863D-B064-4D7A-A66B-C3D3523425FD", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.1:*:*:*:*:*:*:*", matchCriteriaId: "911BB6DB-B2D1-4855-A65C-F0799E034358", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.0.0:*:*:*:*:*:*:*", matchCriteriaId: "44D161F9-D198-4DA0-BF95-19472A0495A8", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.0:*:*:*:*:*:*:*", matchCriteriaId: "06E2C448-F279-476E-9F54-185582BEE9E5", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.1:*:*:*:*:*:*:*", matchCriteriaId: "5943AAEF-A816-4F95-A91F-023A226D6459", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:*:*:*:*:*:*:*", matchCriteriaId: "72E78A8D-6CB6-49F9-9288-9C2EEF41441A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*", matchCriteriaId: "1B6EA0C0-9C26-4A87-98F1-5B317D606ECB", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*", matchCriteriaId: "4D379372-A226-4230-B1F3-04C696518BD8", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.2:*:*:*:*:*:*:*", matchCriteriaId: "22FAC35D-2803-49B0-9382-F14594B88FC5", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.3:*:*:*:*:*:*:*", matchCriteriaId: "3C72257B-FF99-4707-A0E3-316D538B1CF6", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:*:*:*:*:*:*:*", matchCriteriaId: "18CFA52E-F9D7-40C3-9DB5-CDD5767E1F0D", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*", matchCriteriaId: "CB8D3B87-B8F5-490A-B1D9-04F2EE93EEA3", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.1:*:*:*:*:*:*:*", matchCriteriaId: "C1EA4F45-35F7-4687-8D1A-A5ACD846500A", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", matchCriteriaId: "23FF9627-E561-4CF7-A685-6E33D2F6C98C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*", matchCriteriaId: "64273A2C-E5A1-4605-92DD-EBECC7F051D5", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.1:*:*:*:*:*:*:*", matchCriteriaId: "E60CA151-1C3A-45B3-B939-E6F80063C595", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:*:*:*:*:*:*:*", matchCriteriaId: "58BAD5A9-9C67-4056-9344-07C8C42C8E88", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.", }, { lang: "es", value: "En los productos BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800 y los blades VIPRION 4450 en versiones 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 o 12.1.2 de BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM o PEM, una secuencia de paquetes no revelada enviada a los servidores virtuales con perfiles SSL de cliente o servidor pueden hacer que se interrumpan los servicios de plano de datos.", }, ], id: "CVE-2017-6140", lastModified: "2024-11-21T03:29:07.783", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-12-21T17:29:00.607", references: [ { source: "f5sirt@f5.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1040042", }, { source: "f5sirt@f5.com", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://support.f5.com/csp/article/K55102452", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1040042", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://support.f5.com/csp/article/K55102452", }, ], sourceIdentifier: "f5sirt@f5.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-02-01 18:15
Modified
2024-11-21 07:45
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://my.f5.com/manage/s/article/K37708118 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://my.f5.com/manage/s/article/K37708118 | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "08B25AAB-A98C-4F89-9131-29E3A8C0ED23", versionEndIncluding: "13.1.5", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "7DBB52D1-4FB8-4A71-8F83-02D7DDB99F60", versionEndExcluding: "14.1.5.3", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "313014B4-8033-4B57-B838-66EE163E86D4", versionEndExcluding: "15.1.7", versionStartIncluding: "15.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "203B2B00-7DA5-443D-B4AA-DE0814D7E04D", versionEndExcluding: "16.1.3.3", versionStartIncluding: "16.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "93721140-2035-4431-BF5F-CA0C78BBFE53", versionEndExcluding: "17.0.0.2", versionStartIncluding: "17.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "0360F76D-E75E-4B05-A294-B47012323ED9", versionEndIncluding: "13.1.5", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "EE9B290B-21D9-40B0-8A6D-36F2C310C71A", versionEndExcluding: "14.1.5.3", versionStartIncluding: "14.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E25D2597-32D7-4676-9A0C-FCAD8D8900A9", versionEndExcluding: "15.1.7", versionStartIncluding: "15.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "F11221E1-8354-4854-A75D-060721E9671F", versionEndExcluding: "16.1.3.3", versionStartIncluding: "16.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "5FAB540A-6082-4F6E-9CDE-0AB719B1001F", versionEndExcluding: "17.0.0.2", versionStartIncluding: "17.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F510CA2D-E049-4884-AB80-EC03560556EF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*", matchCriteriaId: "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D59AA4F5-B072-4866-9912-FCBB5F77F8EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*", matchCriteriaId: "755CF51B-61AD-4C1E-9954-C44EC30E4339", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C37E575D-5674-4BD6-9C24-D318A905FD4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*", matchCriteriaId: "1BE455B9-7497-42EE-A6D2-EFEB0E9B5589", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5E0FBD3-584B-4E20-A664-AFC8B224466C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*", matchCriteriaId: "3BF87EE2-1A8A-4050-8168-C4C8A1E49AD7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1FA594DF-0441-4761-80AD-C3C64BD1BA59", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*", matchCriteriaId: "1EF35744-F9B6-43FD-804D-955EC5AC7360", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA95257-25F5-483A-BBE5-F906EAF2BCF9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*", matchCriteriaId: "86E943FF-3EE2-4F87-B005-80432EB4FB67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD50226B-5D1A-44A0-B530-BBDB50CDC30F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*", matchCriteriaId: "BAF21909-A75A-42ED-AAF4-3BC3EE412BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B405FC13-0B14-4497-8BE8-E09CE5369DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*", matchCriteriaId: "046B8D26-64B8-46C4-921A-983E0AE82752", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B1685A2-60F2-4B06-A68E-FC2E18CF3BEE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*", matchCriteriaId: "6F5FE621-B69A-4E93-B5FB-AC7C47A73766", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC83C650-6120-4FD8-85FC-131B7E78F9FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*", matchCriteriaId: "4928A6CA-6FD3-405F-878F-12A199C54C03", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E48A49B-586A-4585-8952-EBF30E8C726C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9A1D2B-33AA-4691-9891-4360B9B026EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "21BD097C-73F2-4EB7-9024-3DC63EC419D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A81F6A51-9AEF-4502-B19C-449CC9FA7154", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "33D524EE-B941-4D73-A83F-02C3253492D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C53B31C-E56F-4FD4-9B51-A741DA8FE479", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5EDC8F7B-D052-4DAB-B572-17241E02DC01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*", matchCriteriaId: "4B494DEE-B373-4B3F-95C1-2E0997F32B6E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D400BBB2-399D-41C9-B73B-BDC280B5A51E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*", matchCriteriaId: "5BC625D5-C59F-4D20-BA92-0EC85DAB8AFA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8B5D6038-EB49-47DE-BC4A-8E9888F217DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*", matchCriteriaId: "4233544A-999C-42CD-9B61-E639AAA460B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "43CDBB9F-B6BD-4103-82E8-D66E067704C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*", matchCriteriaId: "24DA75BA-A4B7-46BD-887D-03CDFAF22791", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "612904C3-0EA5-4F56-BDFE-1A2114C28EEE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*", matchCriteriaId: "52B4EBB6-BEEB-42DA-A146-10E401226BED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AF08F72-E905-48C4-9339-0F23EE462CC5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*", matchCriteriaId: "55433400-8996-44B8-94D7-81690145EF94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E8AB5834-CB4C-46AD-A0C6-E3800DE89453", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*", matchCriteriaId: "5918B702-39A4-48F5-B381-7FFF0ABE4920", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19F04564-25E9-4962-949D-6C810091464D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*", matchCriteriaId: "CE3FCE60-4F2F-48FA-A0AC-89DE82118411", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BBFBFFE7-EA68-46E0-A172-FABDD99D7D8D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*", matchCriteriaId: "9940F471-FA88-49FB-B1BD-752366F9A15C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B58A0DEB-F0C7-40BD-ACE3-49F0CD5663D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*", matchCriteriaId: "AD814768-9507-4C58-9398-6898C3F49272", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "83532FB3-30DE-44B9-A1B7-551F91E61C9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*", matchCriteriaId: "3C0B96E2-7E5D-4C82-B4C5-3F35CD650962", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C3DD6188-94B2-43BE-93C8-F2493E2C2C23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*", matchCriteriaId: "776A5309-2A92-462B-9CAB-067F5E522386", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n", }, ], id: "CVE-2023-22839", lastModified: "2024-11-21T07:45:29.820", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "f5sirt@f5.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-02-01T18:15:11.750", references: [ { source: "f5sirt@f5.com", tags: [ "Vendor Advisory", ], url: "https://my.f5.com/manage/s/article/K37708118", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://my.f5.com/manage/s/article/K37708118", }, ], sourceIdentifier: "f5sirt@f5.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "f5sirt@f5.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-01-14 16:15
Modified
2024-11-21 05:34
Severity ?
Summary
On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://support.f5.com/csp/article/K91171450 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K91171450 | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "40B32C31-2F88-4B12-B9BB-5C4934EC728D", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "8DFB13DF-10AE-48A2-A4EC-2C2F5FB18667", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "2BAEFA30-A343-4E60-86EA-FE6E93A0564D", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "A825BB4F-A400-4CB1-B58B-3AA62662ACA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "80186618-EF4E-4EED-8311-6833E2B2E0E5", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "08D386E9-427E-4515-8AB0-3CA8CED0A121", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_analytics:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "C096C2D1-474A-492E-ABA5-D3F4D28B8FDE", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "7B26A096-059B-4BF8-BFB9-857035FAE1B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "11E0C038-1B62-4F69-9EB2-9CB71F0682A0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "DBA389AE-3A84-43DC-AE5A-9314A62F9ED8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "CEF43910-DC64-4325-99DF-4D8DDDEEF742", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "DF85DBD0-9887-4FF4-8569-0621092C1BF0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "9BFE75AC-56D6-45C1-8B08-72C4E22315BA", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "A759DC56-875D-47CD-A578-ACBB8F1260E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "46781C26-584D-4F07-9296-D40FD97B27AA", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "E37E416F-11A0-488B-A64F-0ACB5F877A0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "89A23321-8F06-4444-ACF0-2780B27D85DA", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "1FD9B9A6-BE43-4027-ADFA-9605FE65AE38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_link_controller:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "748FFEC6-7516-4D3C-B34B-51A7E04771AF", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "2102DEFB-5B0D-4DF2-BA52-CF20C1A1836A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "3AC9B792-05C6-4AD5-AA70-38AF889D880E", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "3D8A8664-07B9-424A-98AD-7A5FDFB90408", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "59250868-66F6-4727-8EEF-10E26B18AA11", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "8EB18ECF-F941-4261-AA3A-1D2461EA5916", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0.2.0.45.4:*:*:*:*:*:*:*", matchCriteriaId: "7815CBF4-9D82-457F-82DE-5D2447B89970", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0.2.0.62.4:*:*:*:*:*:*:*", matchCriteriaId: "34EAAE50-147A-4153-8CB7-9D5F1A691D21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35", vulnerable: false, }, { criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG", }, { lang: "es", value: "En las versiones y plataformas afectadas, la comprobación de integridad del sistema del Trusted Platform Module (TPM) no puede detectar modificaciones en componentes específicos del sistema. Este problema solo afecta a las revisiones de ingeniería y plataformas específicas. NOTA: Esta vulnerabilidad no afecta a ninguna de las versiones principales, menores o de mantenimiento de BIG-IP que obtuvieron desde downloads.f5.com. Las compilaciones de las Revisiones de Ingeniería afectadas son las siguientes: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG y Hotfix-BIGIP-14.1.0.2.0.62.4-ENG", }, ], id: "CVE-2020-5851", lastModified: "2024-11-21T05:34:41.807", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "NONE", baseScore: 4.6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-01-14T16:15:11.917", references: [ { source: "f5sirt@f5.com", tags: [ "Vendor Advisory", ], url: "https://support.f5.com/csp/article/K91171450", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://support.f5.com/csp/article/K91171450", }, ], sourceIdentifier: "f5sirt@f5.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }