Vulnerabilites related to f5 - big-ip_i5600
CVE-2020-5851 (GCVE-0-2020-5851)
Vulnerability from cvelistv5
Published
2020-01-14 15:03
Modified
2024-08-04 08:39
Severity ?
Summary
On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG
References
https://support.f5.com/csp/article/K91171450x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a BIG-IP Version: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG, Hotfix-BIGIP-14.1.0.2.0.62.4-ENG
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:39:25.925Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.f5.com/csp/article/K91171450",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "BIG-IP",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Hotfix-BIGIP-14.1.0.2.0.45.4-ENG, Hotfix-BIGIP-14.1.0.2.0.62.4-ENG",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Compromise detection failure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-01-14T15:03:29",
            orgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
            shortName: "f5",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.f5.com/csp/article/K91171450",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "f5sirt@f5.com",
               ID: "CVE-2020-5851",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "BIG-IP",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Hotfix-BIGIP-14.1.0.2.0.45.4-ENG, Hotfix-BIGIP-14.1.0.2.0.62.4-ENG",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Compromise detection failure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://support.f5.com/csp/article/K91171450",
                     refsource: "CONFIRM",
                     url: "https://support.f5.com/csp/article/K91171450",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
      assignerShortName: "f5",
      cveId: "CVE-2020-5851",
      datePublished: "2020-01-14T15:03:29",
      dateReserved: "2020-01-06T00:00:00",
      dateUpdated: "2024-08-04T08:39:25.925Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2023-22839 (GCVE-0-2023-22839)
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2025-03-26 17:48
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Impacted products
Vendor Product Version
F5 BIG-IP Version: 17.0.0   
Version: 16.1.0   
Version: 15.1.0   
Version: 14.1.0   
Version: 13.1.0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:20:31.223Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://my.f5.com/manage/s/article/K37708118",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22839",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-26T17:48:19.712757Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-26T17:48:26.847Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               modules: [
                  "DNS",
                  "LTM enabled with DNS Services license",
               ],
               product: "BIG-IP",
               vendor: "F5",
               versions: [
                  {
                     lessThan: "17.0.0.2",
                     status: "affected",
                     version: "17.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "16.1.3.3",
                     status: "affected",
                     version: "16.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "15.1.8.1",
                     status: "affected",
                     version: "15.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "14.1.5.3",
                     status: "affected",
                     version: "14.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "13.1.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-02-01T15:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br>",
                  },
               ],
               value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "CWE-476 NULL Pointer Dereference",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-02-01T17:56:26.064Z",
            orgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
            shortName: "f5",
         },
         references: [
            {
               url: "https://my.f5.com/manage/s/article/K37708118",
            },
         ],
         source: {
            discovery: "INTERNAL",
         },
         title: "BIG-IP DNS profile vulnerability",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
      assignerShortName: "f5",
      cveId: "CVE-2023-22839",
      datePublished: "2023-02-01T17:56:26.064Z",
      dateReserved: "2023-01-13T06:43:46.141Z",
      dateUpdated: "2025-03-26T17:48:26.847Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-11109 (GCVE-0-2019-11109)
Vulnerability from cvelistv5
Published
2019-12-18 21:09
Modified
2024-08-04 22:48
Severity ?
Summary
Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
n/a Intel(R) SPS Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.655Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&amp%3Butm_medium=RSS",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) SPS",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-27T18:06:04",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&amp%3Butm_medium=RSS",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11109",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) SPS",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
                  },
                  {
                     name: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&amp;utm_medium=RSS",
                     refsource: "CONFIRM",
                     url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&amp;utm_medium=RSS",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11109",
      datePublished: "2019-12-18T21:09:56",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.655Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-6140 (GCVE-0-2017-6140)
Vulnerability from cvelistv5
Published
2017-12-21 17:00
Modified
2024-09-17 04:04
Severity ?
Summary
On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.
References
http://www.securitytracker.com/id/1040042vdb-entry, x_refsource_SECTRACK
https://support.f5.com/csp/article/K55102452x_refsource_CONFIRM
Impacted products
Vendor Product Version
F5 Networks, Inc. BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM, PEM Version: 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4
Version: 11.6.0, 11.6.1
Version: 12.0.0, 12.1.0, 12.1.1, 12.1.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:18:49.914Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1040042",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1040042",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.f5.com/csp/article/K55102452",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM, PEM",
               vendor: "F5 Networks, Inc.",
               versions: [
                  {
                     status: "affected",
                     version: "11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4",
                  },
                  {
                     status: "affected",
                     version: "11.6.0, 11.6.1",
                  },
                  {
                     status: "affected",
                     version: "12.0.0, 12.1.0, 12.1.1, 12.1.2",
                  },
               ],
            },
         ],
         datePublic: "2017-12-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-12-22T10:57:01",
            orgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
            shortName: "f5",
         },
         references: [
            {
               name: "1040042",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1040042",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.f5.com/csp/article/K55102452",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "f5sirt@f5.com",
               DATE_PUBLIC: "2017-12-20T00:00:00",
               ID: "CVE-2017-6140",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM, PEM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4",
                                       },
                                       {
                                          version_value: "11.6.0, 11.6.1",
                                       },
                                       {
                                          version_value: "12.0.0, 12.1.0, 12.1.1, 12.1.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "F5 Networks, Inc.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1040042",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1040042",
                  },
                  {
                     name: "https://support.f5.com/csp/article/K55102452",
                     refsource: "CONFIRM",
                     url: "https://support.f5.com/csp/article/K55102452",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
      assignerShortName: "f5",
      cveId: "CVE-2017-6140",
      datePublished: "2017-12-21T17:00:00Z",
      dateReserved: "2017-02-21T00:00:00",
      dateUpdated: "2024-09-17T04:04:09.104Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Summary
Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel server_platform_services_firmware *
intel server_platform_services_firmware *
intel server_platform_services_firmware *
f5 big-ip_b2250_firmware -
f5 big-ip_b2250 -
f5 big-ip_b4300_firmware -
f5 big-ip_b4300 -
f5 big-ip_b4340n_firmware -
f5 big-ip_b4340n -
f5 big-ip_b4450n_firmware -
f5 big-ip_b4450n -
f5 big-ip_10000s_firmware -
f5 big-ip_10000s -
f5 big-ip_10050s_firmware -
f5 big-ip_10050s -
f5 big-ip_10150v-n_firmware -
f5 big-ip_10150v-n -
f5 big-ip_10200v-s_firmware -
f5 big-ip_10200v-s -
f5 big-ip_10250v_firmware -
f5 big-ip_10250v -
f5 big-ip_10350v-n_firmware -
f5 big-ip_10350v-n -
f5 big-ip_12250v_firmware -
f5 big-ip_12250v -
f5 viprion_2200_firmware -
f5 viprion_2200 -
f5 big-ip_i5600_firmware -
f5 big-ip_i5600 -
f5 big-ip_i5800_firmware -
f5 big-ip_i5800 -
f5 big-ip_i7600_firmware -
f5 big-ip_i7600 -
f5 big-ip_i7800_firmware -
f5 big-ip_i7800 -
f5 big-ip_i10600_firmware -
f5 big-ip_i10600 -
f5 big-ip_i10800_firmware -
f5 big-ip_i10800 -
f5 big-ip_i11600_firmware -
f5 big-ip_i11600 -
f5 big-ip_i11800_firmware -
f5 big-ip_i11800 -
f5 big-ip_i15600_firmware -
f5 big-ip_i15600 -
f5 big-ip_i15800_firmware -
f5 big-ip_i15800 -
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_access_policy_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_advanced_firewall_manager *
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_analytics *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_acceleration_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_application_security_manager *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_fraud_protection_service *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager *
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_link_controller *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *
f5 big-ip_policy_enforcement_manager *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "78198692-74E8-4289-B169-E64C1C50B71C",
                     versionEndExcluding: "sps_e5_04.01.04.275.0",
                     versionStartIncluding: "sps_e5_04.00.00.000.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DFD2B64-3374-4419-B102-42745E051F14",
                     versionEndExcluding: "sps_soc-a_04.00.04.191.0",
                     versionStartIncluding: "sps_soc-a_04.00.00.000.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "33CEC3A1-D09B-4157-9AC7-1160997ADE80",
                     versionEndExcluding: "sps_soc-x_04.00.04.100.0",
                     versionStartIncluding: "sps_soc-x_04.00.00.000.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_b2250_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58DB7299-1600-4868-A270-D4044889524B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_b2250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D2CC5DE-7FAA-4987-BCF2-CB365CFE0C58",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_b4300_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59F24979-7D0A-4BA9-85B2-D9DAF129C11D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_b4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8912E078-E8DC-4587-8B2F-9DC45A18E3CA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_b4340n_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "683F596C-FD78-4C8B-820A-CAA11463EE47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_b4340n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDABDC7-4229-4AC0-AC12-53DE4AD77C4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_b4450n_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A07B4ABC-5C2C-4DC7-8983-DC6E0B090334",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_b4450n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62CBE6F1-89DA-4514-83EA-4721453F5C11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F510CA2D-E049-4884-AB80-EC03560556EF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10050s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EF6B375-272F-4F6B-A5F4-479EE809A89D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10050s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F74715E2-C704-4836-B2B3-FC89B1FC2C5E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10150v-n_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FECA5AC-6B6F-4C38-AD52-B6228A050044",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10150v-n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A33692-B2BF-4602-85B4-E4B75AD6BD1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10200v-s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E48DC368-92D5-49AB-BFB0-638FF4F4B6D5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10200v-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "170C1520-13F7-466C-A485-63EE8745E9ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10250v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F305A2E-8CDC-400C-BAC0-1CE37AC30B0C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10250v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6C9711-AFAE-4B01-BBAE-5499E4B3ED23",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10350v-n_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDFF2C7D-FC63-4044-9A70-130AE650140C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10350v-n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEC3C68F-37C5-411E-8033-FDD4EF3DA339",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_12250v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3004259-DA6B-4BE6-91C0-51594269A56B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_12250v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34177892-A95F-4512-ABA7-430526A2D1B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_2200_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB62EE4-943C-4279-BF38-C12B4563332F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A046243E-10EC-42F8-8311-B24E37106056",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21BD097C-73F2-4EB7-9024-3DC63EC419D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A81F6A51-9AEF-4502-B19C-449CC9FA7154",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33D524EE-B941-4D73-A83F-02C3253492D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C53B31C-E56F-4FD4-9B51-A741DA8FE479",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E48A49B-586A-4585-8952-EBF30E8C726C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA9A1D2B-33AA-4691-9891-4360B9B026EC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85EE39BF-86AA-498B-BF51-EDCD7BD01376",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B5688-0235-4D4F-A26C-440FF24A1B43",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FCB6C17-33AC-4E5E-8633-7490058CA51F",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8D4FBBA-1D87-4CCB-ADB3-42514FB0CF45",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A53E3C-3E09-4100-8D5A-10AD4973C230",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6917369-D3C2-42EB-B73B-F86CE2F17401",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "151ED6D1-AA85-4213-8F3A-8167CBEC4721",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F1C68BC-A3EF-4205-AD00-68CB3A8C65AF",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8BBC028-03DD-4412-9180-883E4252E132",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCAE28C2-0ADD-4FD0-A520-EFB764164DD8",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "596A35D8-3644-4C45-99AC-4D201F170B83",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D5AA99B-08E7-4959-A3B4-41AA527B4B22",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AC8FD5C-AE1A-4484-BB6F-EBB6A48D21F8",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC15881B-9C49-4E77-9FB6-A6E60D0BCAD3",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "36A213C6-D6E4-4F38-989D-81D3DFC11829",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB5A624E-40A1-4F75-8B9A-FA56510C19EE",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DC86A5F-C793-4848-901F-04BFB57A07F6",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0772A366-87B9-40EC-9F63-AE0FF0EF5002",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D4B5A46-AA7B-416F-BA97-76A0BA232C6F",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "59D9F39B-206B-4E76-A811-1CAA705A60EE",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BD61B6A-4E98-4D2C-92BC-FED15CEE39A6",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E5552A3-91CD-4B97-AD33-4F1FB4C8827A",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A53C692-D353-42E3-9148-F850DA11884F",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05106312-E60D-4CF1-B4C8-6F1EF5AF8D75",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "70099A38-3B84-4C40-8590-BE6C8F7C21A7",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9A8A5C3-0C38-4F46-8F98-DC3B9C58D660",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "55C2EC23-E78F-4447-BACF-21FC36ABF155",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35AC237-573B-4309-87EF-3945FA2449BF",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "27ABD6A3-5D67-4543-BB90-602F17A98B52",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DE40473-ABAE-4D91-8EBB-FB5719E107F6",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96E945EE-A623-4775-83B9-4CF81B7EA70F",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "945A19E8-51EB-42FE-9BF1-12DAC78B5286",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B6C3F50-BD60-4A8C-8DBB-680DA4D6BE6D",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B2D963-4E55-45B5-80E0-BC6FFB2122F7",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "92484170-2E91-45F6-9789-B0DF3F5E6260",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB5007D0-BBDB-4D74-9C88-98FBA74757D1",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB07E847-6083-4CC8-8A62-6B9744B87088",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8BBD637-148A-4E1A-B2DC-129BCD121C1E",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF606356-8191-478D-AF60-D48A408CD9ED",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A16FE69-A466-4FA6-BDDA-794C9F2B36FD",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7725810-66D2-4460-A174-9F3BFAD966F2",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0620AA57-83D1-41E6-8ABB-99F3FABB10F0",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A93AAEB9-556E-4F94-ADEC-D9C294B7F37E",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA3E37E6-64B9-4668-AC01-933711E1C934",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "039E73A1-9F90-46A4-BFEE-5E97BAF3FAA6",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFD760FE-4347-4D36-B5C6-4009398060F2",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF552D91-612A-43E1-B2D6-02E2515FEA22",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C8D0EF7-9C65-4491-B358-DB1AAB0EA1FF",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CCD3CF9-EA9D-43FF-8ADA-713B4B5C468E",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "43581457-5C55-4B31-BEFA-4B59B2744BB8",
                     versionEndIncluding: "11.6.5",
                     versionStartIncluding: "11.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "65B76F53-7D8B-477E-8B6E-91AC0A9009FF",
                     versionEndIncluding: "12.1.5",
                     versionStartIncluding: "12.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6704F0A6-16E2-4C2D-B5BD-EDDEAD5C153C",
                     versionEndIncluding: "13.1.3",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "79B0C4C9-FCA9-4108-B349-2EFBB4A1153B",
                     versionEndIncluding: "14.1.2",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC6612AB-E46B-4A8B-9B3E-C711D8C27962",
                     versionEndIncluding: "15.0.1",
                     versionStartIncluding: "15.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.",
      },
      {
         lang: "es",
         value: "Un problema lógico en el subsistema para Intel® SPS versiones anteriores a SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 y SPS_SoC-A_04.00.04.191.0, puede permitir a un usuario privilegiado habilitar potencialmente una denegación de servicio por medio de un acceso local.",
      },
   ],
   id: "CVE-2019-11109",
   lastModified: "2024-11-21T04:20:33.233",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-18T22:15:13.127",
   references: [
      {
         source: "secure@intel.com",
         url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&amp%3Butm_medium=RSS",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.f5.com/csp/article/K54164678?utm_source=f5support&amp%3Butm_medium=RSS",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-12-21 17:29
Modified
2024-11-21 03:29
Summary
On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.
Impacted products
Vendor Product Version
f5 big-ip_local_traffic_manager 11.5.0
f5 big-ip_local_traffic_manager 11.5.1
f5 big-ip_local_traffic_manager 11.5.2
f5 big-ip_local_traffic_manager 11.5.3
f5 big-ip_local_traffic_manager 11.5.4
f5 big-ip_local_traffic_manager 11.6.0
f5 big-ip_local_traffic_manager 11.6.1
f5 big-ip_local_traffic_manager 12.0.0
f5 big-ip_local_traffic_manager 12.1.0
f5 big-ip_local_traffic_manager 12.1.1
f5 big-ip_local_traffic_manager 12.1.2
f5 big-ip_2000s -
f5 big-ip_2200s -
f5 big-ip_4000s -
f5 big-ip_4200v -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 viprion_4450_blades -
f5 big-ip_application_acceleration_manager 11.5.0
f5 big-ip_application_acceleration_manager 11.5.1
f5 big-ip_application_acceleration_manager 11.5.2
f5 big-ip_application_acceleration_manager 11.5.3
f5 big-ip_application_acceleration_manager 11.5.4
f5 big-ip_application_acceleration_manager 11.6.0
f5 big-ip_application_acceleration_manager 11.6.1
f5 big-ip_application_acceleration_manager 12.0.0
f5 big-ip_application_acceleration_manager 12.1.0
f5 big-ip_application_acceleration_manager 12.1.1
f5 big-ip_application_acceleration_manager 12.1.2
f5 big-ip_2000s -
f5 big-ip_2200s -
f5 big-ip_4000s -
f5 big-ip_4200v -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 viprion_4450_blades -
f5 big-ip_advanced_firewall_manager 11.5.0
f5 big-ip_advanced_firewall_manager 11.5.1
f5 big-ip_advanced_firewall_manager 11.5.2
f5 big-ip_advanced_firewall_manager 11.5.3
f5 big-ip_advanced_firewall_manager 11.5.4
f5 big-ip_advanced_firewall_manager 11.6.0
f5 big-ip_advanced_firewall_manager 11.6.1
f5 big-ip_advanced_firewall_manager 12.0.0
f5 big-ip_advanced_firewall_manager 12.1.0
f5 big-ip_advanced_firewall_manager 12.1.1
f5 big-ip_advanced_firewall_manager 12.1.2
f5 big-ip_2000s -
f5 big-ip_2200s -
f5 big-ip_4000s -
f5 big-ip_4200v -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 viprion_4450_blades -
f5 big-ip_analytics 11.5.0
f5 big-ip_analytics 11.5.1
f5 big-ip_analytics 11.5.2
f5 big-ip_analytics 11.5.3
f5 big-ip_analytics 11.5.4
f5 big-ip_analytics 11.6.0
f5 big-ip_analytics 11.6.1
f5 big-ip_analytics 12.0.0
f5 big-ip_analytics 12.1.0
f5 big-ip_analytics 12.1.1
f5 big-ip_analytics 12.1.2
f5 big-ip_2000s -
f5 big-ip_2200s -
f5 big-ip_4000s -
f5 big-ip_4200v -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 viprion_4450_blades -
f5 big-ip_application_security_manager 11.5.0
f5 big-ip_application_security_manager 11.5.1
f5 big-ip_application_security_manager 11.5.2
f5 big-ip_application_security_manager 11.5.3
f5 big-ip_application_security_manager 11.5.4
f5 big-ip_application_security_manager 11.6.0
f5 big-ip_application_security_manager 11.6.1
f5 big-ip_application_security_manager 12.0.0
f5 big-ip_application_security_manager 12.1.0
f5 big-ip_application_security_manager 12.1.1
f5 big-ip_application_security_manager 12.1.2
f5 big-ip_2000s -
f5 big-ip_2200s -
f5 big-ip_4000s -
f5 big-ip_4200v -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 viprion_4450_blades -
f5 big-ip_dns 11.5.0
f5 big-ip_dns 11.5.1
f5 big-ip_dns 11.5.2
f5 big-ip_dns 11.5.3
f5 big-ip_dns 11.5.4
f5 big-ip_dns 11.6.0
f5 big-ip_dns 11.6.1
f5 big-ip_dns 12.0.0
f5 big-ip_dns 12.1.0
f5 big-ip_dns 12.1.1
f5 big-ip_dns 12.1.2
f5 big-ip_2000s -
f5 big-ip_2200s -
f5 big-ip_4000s -
f5 big-ip_4200v -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 viprion_4450_blades -
f5 big-ip_global_traffic_manager 11.5.0
f5 big-ip_global_traffic_manager 11.5.1
f5 big-ip_global_traffic_manager 11.5.2
f5 big-ip_global_traffic_manager 11.5.3
f5 big-ip_global_traffic_manager 11.5.4
f5 big-ip_global_traffic_manager 11.6.0
f5 big-ip_global_traffic_manager 11.6.1
f5 big-ip_global_traffic_manager 12.0.0
f5 big-ip_global_traffic_manager 12.1.0
f5 big-ip_global_traffic_manager 12.1.1
f5 big-ip_global_traffic_manager 12.1.2
f5 big-ip_2000s -
f5 big-ip_2200s -
f5 big-ip_4000s -
f5 big-ip_4200v -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 viprion_4450_blades -
f5 big-ip_policy_enforcement_manager 11.5.0
f5 big-ip_policy_enforcement_manager 11.5.1
f5 big-ip_policy_enforcement_manager 11.5.2
f5 big-ip_policy_enforcement_manager 11.5.3
f5 big-ip_policy_enforcement_manager 11.5.4
f5 big-ip_policy_enforcement_manager 11.6.0
f5 big-ip_policy_enforcement_manager 11.6.1
f5 big-ip_policy_enforcement_manager 12.0.0
f5 big-ip_policy_enforcement_manager 12.1.0
f5 big-ip_policy_enforcement_manager 12.1.1
f5 big-ip_policy_enforcement_manager 12.1.2
f5 big-ip_2000s -
f5 big-ip_2200s -
f5 big-ip_4000s -
f5 big-ip_4200v -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 viprion_4450_blades -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5D27D4A-BD5C-4FA9-AA72-F7956298DE06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "12F86EB5-D581-4103-A802-44D968BA8D55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F383ED-8CB5-400D-BFDB-BD5B8CD8C7AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6203A11-82C3-4ABA-94E9-085BFF1A0E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "06224D59-35F8-4168-80C5-CF5B17E99050",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FF5A5F6-4BA3-4276-8679-B5560EACF2E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2B502F2-404C-463B-B6BE-87489DC881F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "44F1E5E0-BD63-4A4A-BC4E-A1D5495F8B5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82C7B1C-E195-4D94-B604-78FB464C4F81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F6C3144-D0DE-4248-BFCD-04A7E6104044",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0357B5ED-0600-4756-93E5-692987068596",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E3D8A24-0B8D-432B-8F06-D0E1642E7C1C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4489382-0668-4CFB-BA89-D54762937CEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9850D0AA-B173-47B2-9B69-75E6D1FAF490",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "281D0B5B-27DF-4E8A-AFC9-D09468F8ECDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "40994EB4-4D31-4697-964D-1F0B09864DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5B40837-EC2B-41FB-ACC3-806054EAF28C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "48BE0210-7058-462A-BA17-845D3E4F52FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CA2FA6B-3930-432F-8FB5-E73604CEFE42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECA90FB8-E2CD-400F-B753-1B482E7FAC96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FEC804B-35DB-4A0C-9AEA-15527E0CC1B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEB228A9-0C01-4531-B2B2-38BB7B0E02E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3755740D-F1DC-4910-ADDD-9D491515201C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA244A7D-F65D-4114-81C8-CE811959EA10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EA9F72C-8344-4370-B511-31BEC8BA63E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "96CF015E-C74B-4215-9103-8087BC1D12AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE4DB00-433D-414A-A1CE-E507B9BB809B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B276E4DF-69FC-4158-B93A-781A45605034",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBAB92C5-2D50-49CC-AECA-0D16BC44A788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "532AAF54-64EF-4852-B4F1-D5E660463704",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC827031-CA39-4081-8CE0-30EAC78DF756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7569903B-3A15-4A10-863B-6828337DD268",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "45825991-D17D-42F1-87B4-7DF86B098B45",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D226F1-6513-4233-BE20-58D7AB24978F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B33B2082-E040-4799-A260-BA687ED8614E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A85766A4-2181-4719-ADCF-4FEA0031DB80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2E93EE3-DB73-468E-87CA-4D277F283648",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:11.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB01A61-1924-417F-8A75-9FDF8F14F754",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B70D2BD5-8E3F-4B57-84EF-3AF40F6378F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:11.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A065BC0-56BD-4665-A860-EBA37F1A4D8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0EDB8E9-E6FB-406E-B1D3-C620F114804C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:12.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "77192AFB-B612-4BAA-916C-3DF8E851CC2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:12.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE295AF6-2B35-467F-8501-B5753CDDE16C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:12.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3C03B68-914F-4DB0-A832-B626B8746524",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AD2C1D2-103E-4B0F-84AA-999F01E695F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "855E91A4-0A0C-4E5C-8019-FB513A793803",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCCC2092-E109-4FF6-9B85-6C9434269851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8923BB93-96C1-417B-9172-4A81E731EBA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "274E34BF-82A5-4D9E-BC72-202193A47A5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "475F0EF8-42CB-4099-9C4A-390F946C4924",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "94DBCD7A-E4DA-4C08-87A4-960CF53A83E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "62B0A70A-D101-443E-A543-5EC35E23D66F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DB2118A-0F9C-4273-BB07-85FEA32C785B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8541C9EF-69A8-4641-B173-3BCE0EDD20A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E24A3C71-0075-4738-B114-267337D050CD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E142B175-0E9D-4051-A6B1-FF9E7583DFBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B131043-3C02-47CE-8D1C-BB29A20113E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCE4ACE8-1309-4631-9E34-A6032009B702",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70560C5-AEB5-4144-A0AA-10A63527B5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:11.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F2CE884-45CD-4EB8-8568-B3AEAB017361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:11.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EAEC7D0-4BE1-42EE-91CA-56204FEAD048",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:11.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "510C2966-F495-49BB-99D6-53468FD95832",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:12.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE97E4B1-88D7-4B3E-BEA3-0AD2A01347FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:12.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E3AE25-2F4F-4CE5-8842-E02346162D7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:12.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CCC6CA6-2BE8-40D4-AC55-94AF8F5BEDF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_dns:12.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FE0213-787C-49CB-96B8-EAC9DE0977EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0594DBC5-8470-416C-A5EA-E04F5AB2C799",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B50BF19F-71B4-47C0-A96E-6EB90FCC6AE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD3A3BA6-6F60-45CA-8F52-687B671B077A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "202B6870-718C-4F8D-9BAB-7ED6385BF2A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC6A3691-ADC4-44BC-8A11-D855B13EF128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7D7863D-B064-4D7A-A66B-C3D3523425FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "911BB6DB-B2D1-4855-A65C-F0799E034358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "44D161F9-D198-4DA0-BF95-19472A0495A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "06E2C448-F279-476E-9F54-185582BEE9E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5943AAEF-A816-4F95-A91F-023A226D6459",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E78A8D-6CB6-49F9-9288-9C2EEF41441A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B6EA0C0-9C26-4A87-98F1-5B317D606ECB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D379372-A226-4230-B1F3-04C696518BD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FAC35D-2803-49B0-9382-F14594B88FC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C72257B-FF99-4707-A0E3-316D538B1CF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "18CFA52E-F9D7-40C3-9DB5-CDD5767E1F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB8D3B87-B8F5-490A-B1D9-04F2EE93EEA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1EA4F45-35F7-4687-8D1A-A5ACD846500A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "23FF9627-E561-4CF7-A685-6E33D2F6C98C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "64273A2C-E5A1-4605-92DD-EBECC7F051D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E60CA151-1C3A-45B3-B939-E6F80063C595",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "58BAD5A9-9C67-4056-9344-07C8C42C8E88",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB09D38C-6314-48DF-82DB-68ED2AA2A87F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE3D3C8-2B7C-4336-A237-7022949B3883",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A481AA79-5A01-4051-9F3D-ACC203CC9398",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1FDCC56-7608-4856-8945-3D06155150AA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4ADE44-5E90-411D-B11F-941B1122B9CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.",
      },
      {
         lang: "es",
         value: "En los productos BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800 y los blades VIPRION 4450 en versiones 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 o 12.1.2 de BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM o PEM, una secuencia de paquetes no revelada enviada a los servidores virtuales con perfiles SSL de cliente o servidor pueden hacer que se interrumpan los servicios de plano de datos.",
      },
   ],
   id: "CVE-2017-6140",
   lastModified: "2024-11-21T03:29:07.783",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-12-21T17:29:00.607",
   references: [
      {
         source: "f5sirt@f5.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1040042",
      },
      {
         source: "f5sirt@f5.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://support.f5.com/csp/article/K55102452",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1040042",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://support.f5.com/csp/article/K55102452",
      },
   ],
   sourceIdentifier: "f5sirt@f5.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-02-01 18:15
Modified
2024-11-21 07:45
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Impacted products
Vendor Product Version
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_10000s_firmware -
f5 big-ip_10000s -
f5 big-ip_10200v_firmware -
f5 big-ip_10200v -
f5 big-ip_10200v-ssl_firmware -
f5 big-ip_10200v-ssl -
f5 big-ip_12000_firmware -
f5 big-ip_12000 -
f5 big-ip_5000s_firmware -
f5 big-ip_5000s -
f5 big-ip_5200v_firmware -
f5 big-ip_5200v -
f5 big-ip_5200v-ssl_firmware -
f5 big-ip_5200v-ssl -
f5 big-ip_7000s_firmware -
f5 big-ip_7000s -
f5 big-ip_7200v_firmware -
f5 big-ip_7200v -
f5 big-ip_7200v-ssl_firmware -
f5 big-ip_7200v-ssl -
f5 big-ip_i10600_firmware -
f5 big-ip_i10600 -
f5 big-ip_i10800_firmware -
f5 big-ip_i10800 -
f5 big-ip_i11600_firmware -
f5 big-ip_i11600 -
f5 big-ip_i11800_firmware -
f5 big-ip_i11800 -
f5 big-ip_i15600_firmware -
f5 big-ip_i15600 -
f5 big-ip_i15800_firmware -
f5 big-ip_i15800 -
f5 big-ip_i5600_firmware -
f5 big-ip_i5600 -
f5 big-ip_i5800_firmware -
f5 big-ip_i5800 -
f5 big-ip_i7600_firmware -
f5 big-ip_i7600 -
f5 big-ip_i7800_firmware -
f5 big-ip_i7800 -
f5 r10600_firmware -
f5 r10600 -
f5 r10800_firmware -
f5 r10800 -
f5 r10900_firmware -
f5 r10900 -
f5 r5600_firmware -
f5 r5600 -
f5 r5800_firmware -
f5 r5800 -
f5 r5900_firmware -
f5 r5900 -
f5 velos_bx110_firmware -
f5 velos_bx110 -
f5 viprion_b2100_firmware -
f5 viprion_b2100 -
f5 viprion_b2150_firmware -
f5 viprion_b2150 -
f5 viprion_b2250_firmware -
f5 viprion_b2250 -
f5 viprion_b4300_firmware -
f5 viprion_b4300 -
f5 viprion_b4450_firmware -
f5 viprion_b4450 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08B25AAB-A98C-4F89-9131-29E3A8C0ED23",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DBB52D1-4FB8-4A71-8F83-02D7DDB99F60",
                     versionEndExcluding: "14.1.5.3",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "313014B4-8033-4B57-B838-66EE163E86D4",
                     versionEndExcluding: "15.1.7",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "203B2B00-7DA5-443D-B4AA-DE0814D7E04D",
                     versionEndExcluding: "16.1.3.3",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93721140-2035-4431-BF5F-CA0C78BBFE53",
                     versionEndExcluding: "17.0.0.2",
                     versionStartIncluding: "17.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0360F76D-E75E-4B05-A294-B47012323ED9",
                     versionEndIncluding: "13.1.5",
                     versionStartIncluding: "13.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE9B290B-21D9-40B0-8A6D-36F2C310C71A",
                     versionEndExcluding: "14.1.5.3",
                     versionStartIncluding: "14.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E25D2597-32D7-4676-9A0C-FCAD8D8900A9",
                     versionEndExcluding: "15.1.7",
                     versionStartIncluding: "15.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F11221E1-8354-4854-A75D-060721E9671F",
                     versionEndExcluding: "16.1.3.3",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FAB540A-6082-4F6E-9CDE-0AB719B1001F",
                     versionEndExcluding: "17.0.0.2",
                     versionStartIncluding: "17.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F510CA2D-E049-4884-AB80-EC03560556EF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D59AA4F5-B072-4866-9912-FCBB5F77F8EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "755CF51B-61AD-4C1E-9954-C44EC30E4339",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C37E575D-5674-4BD6-9C24-D318A905FD4E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BE455B9-7497-42EE-A6D2-EFEB0E9B5589",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5E0FBD3-584B-4E20-A664-AFC8B224466C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BF87EE2-1A8A-4050-8168-C4C8A1E49AD7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FA594DF-0441-4761-80AD-C3C64BD1BA59",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EF35744-F9B6-43FD-804D-955EC5AC7360",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EA95257-25F5-483A-BBE5-F906EAF2BCF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E943FF-3EE2-4F87-B005-80432EB4FB67",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD50226B-5D1A-44A0-B530-BBDB50CDC30F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAF21909-A75A-42ED-AAF4-3BC3EE412BA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B405FC13-0B14-4497-8BE8-E09CE5369DE3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "046B8D26-64B8-46C4-921A-983E0AE82752",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1685A2-60F2-4B06-A68E-FC2E18CF3BEE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F5FE621-B69A-4E93-B5FB-AC7C47A73766",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC83C650-6120-4FD8-85FC-131B7E78F9FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4928A6CA-6FD3-405F-878F-12A199C54C03",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E48A49B-586A-4585-8952-EBF30E8C726C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA9A1D2B-33AA-4691-9891-4360B9B026EC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21BD097C-73F2-4EB7-9024-3DC63EC419D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A81F6A51-9AEF-4502-B19C-449CC9FA7154",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33D524EE-B941-4D73-A83F-02C3253492D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C53B31C-E56F-4FD4-9B51-A741DA8FE479",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EDC8F7B-D052-4DAB-B572-17241E02DC01",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B494DEE-B373-4B3F-95C1-2E0997F32B6E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D400BBB2-399D-41C9-B73B-BDC280B5A51E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BC625D5-C59F-4D20-BA92-0EC85DAB8AFA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B5D6038-EB49-47DE-BC4A-8E9888F217DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4233544A-999C-42CD-9B61-E639AAA460B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43CDBB9F-B6BD-4103-82E8-D66E067704C2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24DA75BA-A4B7-46BD-887D-03CDFAF22791",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "612904C3-0EA5-4F56-BDFE-1A2114C28EEE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52B4EBB6-BEEB-42DA-A146-10E401226BED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF08F72-E905-48C4-9339-0F23EE462CC5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "55433400-8996-44B8-94D7-81690145EF94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8AB5834-CB4C-46AD-A0C6-E3800DE89453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5918B702-39A4-48F5-B381-7FFF0ABE4920",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19F04564-25E9-4962-949D-6C810091464D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE3FCE60-4F2F-48FA-A0AC-89DE82118411",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBFBFFE7-EA68-46E0-A172-FABDD99D7D8D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9940F471-FA88-49FB-B1BD-752366F9A15C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58A0DEB-F0C7-40BD-ACE3-49F0CD5663D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD814768-9507-4C58-9398-6898C3F49272",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "83532FB3-30DE-44B9-A1B7-551F91E61C9F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C0B96E2-7E5D-4C82-B4C5-3F35CD650962",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3DD6188-94B2-43BE-93C8-F2493E2C2C23",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "776A5309-2A92-462B-9CAB-067F5E522386",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n",
      },
   ],
   id: "CVE-2023-22839",
   lastModified: "2024-11-21T07:45:29.820",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "f5sirt@f5.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-02-01T18:15:11.750",
   references: [
      {
         source: "f5sirt@f5.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://my.f5.com/manage/s/article/K37708118",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://my.f5.com/manage/s/article/K37708118",
      },
   ],
   sourceIdentifier: "f5sirt@f5.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "f5sirt@f5.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-01-14 16:15
Modified
2024-11-21 05:34
Summary
On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG
Impacted products
Vendor Product Version
f5 big-ip_local_traffic_manager 14.1.0.2.0.45.4
f5 big-ip_local_traffic_manager 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_advanced_firewall_manager 14.1.0.2.0.45.4
f5 big-ip_advanced_firewall_manager 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_application_acceleration_manager 14.1.0.2.0.45.4
f5 big-ip_application_acceleration_manager 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_analytics 14.1.0.2.0.45.4
f5 big-ip_analytics 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_access_policy_manager 14.1.0.2.0.45.4
f5 big-ip_access_policy_manager 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_application_security_manager 14.1.0.2.0.45.4
f5 big-ip_application_security_manager 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_edge_gateway 14.1.0.2.0.45.4
f5 big-ip_edge_gateway 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_fraud_protection_service 14.1.0.2.0.45.4
f5 big-ip_fraud_protection_service 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_global_traffic_manager 14.1.0.2.0.45.4
f5 big-ip_global_traffic_manager 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_link_controller 14.1.0.2.0.45.4
f5 big-ip_link_controller 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_policy_enforcement_manager 14.1.0.2.0.45.4
f5 big-ip_policy_enforcement_manager 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_webaccelerator 14.1.0.2.0.45.4
f5 big-ip_webaccelerator 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -
f5 big-ip_domain_name_system 14.1.0.2.0.45.4
f5 big-ip_domain_name_system 14.1.0.2.0.62.4
f5 big-ip_2800 -
f5 big-ip_i10600 -
f5 big-ip_i10800 -
f5 big-ip_i11600 -
f5 big-ip_i11800 -
f5 big-ip_i15600 -
f5 big-ip_i15800 -
f5 big-ip_i2600 -
f5 big-ip_i4600 -
f5 big-ip_i4800 -
f5 big-ip_i5600 -
f5 big-ip_i5800 -
f5 big-ip_i7600 -
f5 big-ip_i7800 -
f5 big-ip_i850 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "40B32C31-2F88-4B12-B9BB-5C4934EC728D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DFB13DF-10AE-48A2-A4EC-2C2F5FB18667",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAEFA30-A343-4E60-86EA-FE6E93A0564D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A825BB4F-A400-4CB1-B58B-3AA62662ACA1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "80186618-EF4E-4EED-8311-6833E2B2E0E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "08D386E9-427E-4515-8AB0-3CA8CED0A121",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C096C2D1-474A-492E-ABA5-D3F4D28B8FDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_analytics:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B26A096-059B-4BF8-BFB9-857035FAE1B9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "11E0C038-1B62-4F69-9EB2-9CB71F0682A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA389AE-3A84-43DC-AE5A-9314A62F9ED8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEF43910-DC64-4325-99DF-4D8DDDEEF742",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF85DBD0-9887-4FF4-8569-0621092C1BF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BFE75AC-56D6-45C1-8B08-72C4E22315BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A759DC56-875D-47CD-A578-ACBB8F1260E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "46781C26-584D-4F07-9296-D40FD97B27AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E37E416F-11A0-488B-A64F-0ACB5F877A0F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "89A23321-8F06-4444-ACF0-2780B27D85DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FD9B9A6-BE43-4027-ADFA-9605FE65AE38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "748FFEC6-7516-4D3C-B34B-51A7E04771AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_link_controller:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "2102DEFB-5B0D-4DF2-BA52-CF20C1A1836A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AC9B792-05C6-4AD5-AA70-38AF889D880E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D8A8664-07B9-424A-98AD-7A5FDFB90408",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "59250868-66F6-4727-8EEF-10E26B18AA11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB18ECF-F941-4261-AA3A-1D2461EA5916",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0.2.0.45.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7815CBF4-9D82-457F-82DE-5D2447B89970",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0.2.0.62.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "34EAAE50-147A-4153-8CB7-9D5F1A691D21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9240FE23-A112-46C9-ABC2-AA176E165E35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "906F880E-4C8D-49B7-8C61-2C22348373CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37E2A71-1BDC-4556-8204-2A3140EA2923",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A10E805-0870-46E4-8817-1ADBDFAD6C26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "629B77CA-B349-46FB-94D9-21F457BF2629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C46A4D-3773-4EB4-B397-D02694FC65BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7569487-6D88-46CC-9B70-59D56DB0CE35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "264AE307-F150-4737-8E79-5B9B30558A7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG",
      },
      {
         lang: "es",
         value: "En las versiones y plataformas afectadas, la comprobación de integridad del sistema del Trusted Platform Module (TPM) no puede detectar modificaciones en componentes específicos del sistema. Este problema solo afecta a las revisiones de ingeniería y plataformas específicas. NOTA: Esta vulnerabilidad no afecta a ninguna de las versiones principales, menores o de mantenimiento de BIG-IP que obtuvieron desde downloads.f5.com. Las compilaciones de las Revisiones de Ingeniería afectadas son las siguientes: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG y Hotfix-BIGIP-14.1.0.2.0.62.4-ENG",
      },
   ],
   id: "CVE-2020-5851",
   lastModified: "2024-11-21T05:34:41.807",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "PHYSICAL",
               availabilityImpact: "NONE",
               baseScore: 4.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-01-14T16:15:11.917",
   references: [
      {
         source: "f5sirt@f5.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.f5.com/csp/article/K91171450",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.f5.com/csp/article/K91171450",
      },
   ],
   sourceIdentifier: "f5sirt@f5.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}