All the vulnerabilites related to f5 - big-ip_i5800
cve-2017-6140
Vulnerability from cvelistv5
Published
2017-12-21 17:00
Modified
2024-09-17 04:04
Severity ?
EPSS score ?
Summary
On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1040042 | vdb-entry, x_refsource_SECTRACK | |
https://support.f5.com/csp/article/K55102452 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | F5 Networks, Inc. | BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM, PEM |
Version: 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4 Version: 11.6.0, 11.6.1 Version: 12.0.0, 12.1.0, 12.1.1, 12.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:18:49.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1040042", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040042" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K55102452" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM, PEM", "vendor": "F5 Networks, Inc.", "versions": [ { "status": "affected", "version": "11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4" }, { "status": "affected", "version": "11.6.0, 11.6.1" }, { "status": "affected", "version": "12.0.0, 12.1.0, 12.1.1, 12.1.2" } ] } ], "datePublic": "2017-12-20T00:00:00", "descriptions": [ { "lang": "en", "value": "On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-22T10:57:01", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "name": "1040042", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040042" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K55102452" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2017-12-20T00:00:00", "ID": "CVE-2017-6140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM, PEM", "version": { "version_data": [ { "version_value": "11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4" }, { "version_value": "11.6.0, 11.6.1" }, { "version_value": "12.0.0, 12.1.0, 12.1.1, 12.1.2" } ] } } ] }, "vendor_name": "F5 Networks, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "1040042", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040042" }, { "name": "https://support.f5.com/csp/article/K55102452", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K55102452" } ] } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2017-6140", "datePublished": "2017-12-21T17:00:00Z", "dateReserved": "2017-02-21T00:00:00", "dateUpdated": "2024-09-17T04:04:09.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11109
Vulnerability from cvelistv5
Published
2019-12-18 21:09
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K54164678?utm_source=f5support&%3Butm_medium=RSS | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) SPS |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:48:08.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) SPS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-27T18:06:04", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11109", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) SPS", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "name": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026amp;utm_medium=RSS" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11109", "datePublished": "2019-12-18T21:09:56", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:48:08.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5851
Vulnerability from cvelistv5
Published
2020-01-14 15:03
Modified
2024-08-04 08:39
Severity ?
EPSS score ?
Summary
On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG
References
▼ | URL | Tags |
---|---|---|
https://support.f5.com/csp/article/K91171450 | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:39:25.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K91171450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Hotfix-BIGIP-14.1.0.2.0.45.4-ENG, Hotfix-BIGIP-14.1.0.2.0.62.4-ENG" } ] } ], "descriptions": [ { "lang": "en", "value": "On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG" } ], "problemTypes": [ { "descriptions": [ { "description": "Compromise detection failure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-14T15:03:29", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K91171450" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "ID": "CVE-2020-5851", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP", "version": { "version_data": [ { "version_value": "Hotfix-BIGIP-14.1.0.2.0.45.4-ENG, Hotfix-BIGIP-14.1.0.2.0.62.4-ENG" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Compromise detection failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K91171450", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91171450" } ] } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2020-5851", "datePublished": "2020-01-14T15:03:29", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:39:25.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22839
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K37708118" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "DNS", "LTM enabled with DNS Services license" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8.1", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:56:26.064Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K37708118" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP DNS profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22839", "datePublished": "2023-02-01T17:56:26.064Z", "dateReserved": "2023-01-13T06:43:46.141Z", "dateUpdated": "2024-08-02T10:20:31.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-01-14 16:15
Modified
2024-11-21 05:34
Severity ?
Summary
On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://support.f5.com/csp/article/K91171450 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K91171450 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "40B32C31-2F88-4B12-B9BB-5C4934EC728D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "8DFB13DF-10AE-48A2-A4EC-2C2F5FB18667", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "2BAEFA30-A343-4E60-86EA-FE6E93A0564D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "A825BB4F-A400-4CB1-B58B-3AA62662ACA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "80186618-EF4E-4EED-8311-6833E2B2E0E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "08D386E9-427E-4515-8AB0-3CA8CED0A121", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_analytics:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "C096C2D1-474A-492E-ABA5-D3F4D28B8FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "7B26A096-059B-4BF8-BFB9-857035FAE1B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "11E0C038-1B62-4F69-9EB2-9CB71F0682A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "DBA389AE-3A84-43DC-AE5A-9314A62F9ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "CEF43910-DC64-4325-99DF-4D8DDDEEF742", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF85DBD0-9887-4FF4-8569-0621092C1BF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "9BFE75AC-56D6-45C1-8B08-72C4E22315BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "A759DC56-875D-47CD-A578-ACBB8F1260E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "46781C26-584D-4F07-9296-D40FD97B27AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "E37E416F-11A0-488B-A64F-0ACB5F877A0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "89A23321-8F06-4444-ACF0-2780B27D85DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "1FD9B9A6-BE43-4027-ADFA-9605FE65AE38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "748FFEC6-7516-4D3C-B34B-51A7E04771AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "2102DEFB-5B0D-4DF2-BA52-CF20C1A1836A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "3AC9B792-05C6-4AD5-AA70-38AF889D880E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A8664-07B9-424A-98AD-7A5FDFB90408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "59250868-66F6-4727-8EEF-10E26B18AA11", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "8EB18ECF-F941-4261-AA3A-1D2461EA5916", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0.2.0.45.4:*:*:*:*:*:*:*", "matchCriteriaId": "7815CBF4-9D82-457F-82DE-5D2447B89970", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0.2.0.62.4:*:*:*:*:*:*:*", "matchCriteriaId": "34EAAE50-147A-4153-8CB7-9D5F1A691D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2800:-:*:*:*:*:*:*:*", "matchCriteriaId": "9240FE23-A112-46C9-ABC2-AA176E165E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A10E805-0870-46E4-8817-1ADBDFAD6C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B80C70B-88BB-4C1D-83B3-2E4DA59A2C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i4800:-:*:*:*:*:*:*:*", "matchCriteriaId": "629B77CA-B349-46FB-94D9-21F457BF2629", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "matchCriteriaId": "264AE307-F150-4737-8E79-5B9B30558A7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On impacted versions and platforms the Trusted Platform Module (TPM) system integrity check cannot detect modifications to specific system components. This issue only impacts specific engineering hotfixes and platforms. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG Hotfix-BIGIP-14.1.0.2.0.62.4-ENG" }, { "lang": "es", "value": "En las versiones y plataformas afectadas, la comprobaci\u00f3n de integridad del sistema del Trusted Platform Module (TPM) no puede detectar modificaciones en componentes espec\u00edficos del sistema. Este problema solo afecta a las revisiones de ingenier\u00eda y plataformas espec\u00edficas. NOTA: Esta vulnerabilidad no afecta a ninguna de las versiones principales, menores o de mantenimiento de BIG-IP que obtuvieron desde downloads.f5.com. Las compilaciones de las Revisiones de Ingenier\u00eda afectadas son las siguientes: Hotfix-BIGIP-14.1.0.2.0.45.4-ENG y Hotfix-BIGIP-14.1.0.2.0.62.4-ENG" } ], "id": "CVE-2020-5851", "lastModified": "2024-11-21T05:34:41.807", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-14T16:15:11.917", "references": [ { "source": "f5sirt@f5.com", "tags": [ "Vendor Advisory" ], "url": "https://support.f5.com/csp/article/K91171450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.f5.com/csp/article/K91171450" } ], "sourceIdentifier": "f5sirt@f5.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-21 17:29
Modified
2024-11-21 03:29
Severity ?
Summary
On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | http://www.securitytracker.com/id/1040042 | Third Party Advisory, VDB Entry | |
f5sirt@f5.com | https://support.f5.com/csp/article/K55102452 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040042 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K55102452 | Issue Tracking, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5D27D4A-BD5C-4FA9-AA72-F7956298DE06", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "12F86EB5-D581-4103-A802-44D968BA8D55", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "36F383ED-8CB5-400D-BFDB-BD5B8CD8C7AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6203A11-82C3-4ABA-94E9-085BFF1A0E4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "06224D59-35F8-4168-80C5-CF5B17E99050", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FF5A5F6-4BA3-4276-8679-B5560EACF2E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A2B502F2-404C-463B-B6BE-87489DC881F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "44F1E5E0-BD63-4A4A-BC4E-A1D5495F8B5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A82C7B1C-E195-4D94-B604-78FB464C4F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F6C3144-D0DE-4248-BFCD-04A7E6104044", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0357B5ED-0600-4756-93E5-692987068596", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE3D3C8-2B7C-4336-A237-7022949B3883", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481AA79-5A01-4051-9F3D-ACC203CC9398", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDCC56-7608-4856-8945-3D06155150AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B4ADE44-5E90-411D-B11F-941B1122B9CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0E3D8A24-0B8D-432B-8F06-D0E1642E7C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4489382-0668-4CFB-BA89-D54762937CEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "9850D0AA-B173-47B2-9B69-75E6D1FAF490", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "281D0B5B-27DF-4E8A-AFC9-D09468F8ECDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "40994EB4-4D31-4697-964D-1F0B09864DF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5B40837-EC2B-41FB-ACC3-806054EAF28C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "48BE0210-7058-462A-BA17-845D3E4F52FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CA2FA6B-3930-432F-8FB5-E73604CEFE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECA90FB8-E2CD-400F-B753-1B482E7FAC96", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FEC804B-35DB-4A0C-9AEA-15527E0CC1B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BEB228A9-0C01-4531-B2B2-38BB7B0E02E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE3D3C8-2B7C-4336-A237-7022949B3883", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481AA79-5A01-4051-9F3D-ACC203CC9398", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDCC56-7608-4856-8945-3D06155150AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B4ADE44-5E90-411D-B11F-941B1122B9CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3755740D-F1DC-4910-ADDD-9D491515201C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "EA244A7D-F65D-4114-81C8-CE811959EA10", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5EA9F72C-8344-4370-B511-31BEC8BA63E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "96CF015E-C74B-4215-9103-8087BC1D12AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "CFE4DB00-433D-414A-A1CE-E507B9BB809B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B276E4DF-69FC-4158-B93A-781A45605034", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBAB92C5-2D50-49CC-AECA-0D16BC44A788", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "532AAF54-64EF-4852-B4F1-D5E660463704", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC827031-CA39-4081-8CE0-30EAC78DF756", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7569903B-3A15-4A10-863B-6828337DD268", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "45825991-D17D-42F1-87B4-7DF86B098B45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE3D3C8-2B7C-4336-A237-7022949B3883", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481AA79-5A01-4051-9F3D-ACC203CC9398", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDCC56-7608-4856-8945-3D06155150AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B4ADE44-5E90-411D-B11F-941B1122B9CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7D226F1-6513-4233-BE20-58D7AB24978F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B33B2082-E040-4799-A260-BA687ED8614E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A85766A4-2181-4719-ADCF-4FEA0031DB80", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2E93EE3-DB73-468E-87CA-4D277F283648", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "ADB01A61-1924-417F-8A75-9FDF8F14F754", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B70D2BD5-8E3F-4B57-84EF-3AF40F6378F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2A065BC0-56BD-4665-A860-EBA37F1A4D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0EDB8E9-E6FB-406E-B1D3-C620F114804C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "77192AFB-B612-4BAA-916C-3DF8E851CC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE295AF6-2B35-467F-8501-B5753CDDE16C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "E3C03B68-914F-4DB0-A832-B626B8746524", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE3D3C8-2B7C-4336-A237-7022949B3883", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481AA79-5A01-4051-9F3D-ACC203CC9398", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDCC56-7608-4856-8945-3D06155150AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B4ADE44-5E90-411D-B11F-941B1122B9CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD2C1D2-103E-4B0F-84AA-999F01E695F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "855E91A4-0A0C-4E5C-8019-FB513A793803", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "FCCC2092-E109-4FF6-9B85-6C9434269851", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "8923BB93-96C1-417B-9172-4A81E731EBA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "274E34BF-82A5-4D9E-BC72-202193A47A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "475F0EF8-42CB-4099-9C4A-390F946C4924", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "94DBCD7A-E4DA-4C08-87A4-960CF53A83E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "62B0A70A-D101-443E-A543-5EC35E23D66F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DB2118A-0F9C-4273-BB07-85FEA32C785B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8541C9EF-69A8-4641-B173-3BCE0EDD20A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "E24A3C71-0075-4738-B114-267337D050CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE3D3C8-2B7C-4336-A237-7022949B3883", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481AA79-5A01-4051-9F3D-ACC203CC9398", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDCC56-7608-4856-8945-3D06155150AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B4ADE44-5E90-411D-B11F-941B1122B9CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_dns:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E142B175-0E9D-4051-A6B1-FF9E7583DFBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B131043-3C02-47CE-8D1C-BB29A20113E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:11.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DCE4ACE8-1309-4631-9E34-A6032009B702", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:11.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A70560C5-AEB5-4144-A0AA-10A63527B5C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "8F2CE884-45CD-4EB8-8568-B3AEAB017361", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0EAEC7D0-4BE1-42EE-91CA-56204FEAD048", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "510C2966-F495-49BB-99D6-53468FD95832", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE97E4B1-88D7-4B3E-BEA3-0AD2A01347FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2E3AE25-2F4F-4CE5-8842-E02346162D7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4CCC6CA6-2BE8-40D4-AC55-94AF8F5BEDF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_dns:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "62FE0213-787C-49CB-96B8-EAC9DE0977EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE3D3C8-2B7C-4336-A237-7022949B3883", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481AA79-5A01-4051-9F3D-ACC203CC9398", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDCC56-7608-4856-8945-3D06155150AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B4ADE44-5E90-411D-B11F-941B1122B9CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0594DBC5-8470-416C-A5EA-E04F5AB2C799", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B50BF19F-71B4-47C0-A96E-6EB90FCC6AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BD3A3BA6-6F60-45CA-8F52-687B671B077A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "202B6870-718C-4F8D-9BAB-7ED6385BF2A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EC6A3691-ADC4-44BC-8A11-D855B13EF128", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7D7863D-B064-4D7A-A66B-C3D3523425FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "911BB6DB-B2D1-4855-A65C-F0799E034358", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "44D161F9-D198-4DA0-BF95-19472A0495A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "06E2C448-F279-476E-9F54-185582BEE9E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5943AAEF-A816-4F95-A91F-023A226D6459", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "72E78A8D-6CB6-49F9-9288-9C2EEF41441A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE3D3C8-2B7C-4336-A237-7022949B3883", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481AA79-5A01-4051-9F3D-ACC203CC9398", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDCC56-7608-4856-8945-3D06155150AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B4ADE44-5E90-411D-B11F-941B1122B9CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B6EA0C0-9C26-4A87-98F1-5B317D606ECB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D379372-A226-4230-B1F3-04C696518BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "22FAC35D-2803-49B0-9382-F14594B88FC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "3C72257B-FF99-4707-A0E3-316D538B1CF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "18CFA52E-F9D7-40C3-9DB5-CDD5767E1F0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB8D3B87-B8F5-490A-B1D9-04F2EE93EEA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1EA4F45-35F7-4687-8D1A-A5ACD846500A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "23FF9627-E561-4CF7-A685-6E33D2F6C98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "64273A2C-E5A1-4605-92DD-EBECC7F051D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E60CA151-1C3A-45B3-B939-E6F80063C595", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "58BAD5A9-9C67-4056-9344-07C8C42C8E88", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB09D38C-6314-48DF-82DB-68ED2AA2A87F", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE3D3C8-2B7C-4336-A237-7022949B3883", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481AA79-5A01-4051-9F3D-ACC203CC9398", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1FDCC56-7608-4856-8945-3D06155150AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false }, { "criteria": "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B4ADE44-5E90-411D-B11F-941B1122B9CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services." }, { "lang": "es", "value": "En los productos BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800 y los blades VIPRION 4450 en versiones 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 o 12.1.2 de BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM o PEM, una secuencia de paquetes no revelada enviada a los servidores virtuales con perfiles SSL de cliente o servidor pueden hacer que se interrumpan los servicios de plano de datos." } ], "id": "CVE-2017-6140", "lastModified": "2024-11-21T03:29:07.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-21T17:29:00.607", "references": [ { "source": "f5sirt@f5.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040042" }, { "source": "f5sirt@f5.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://support.f5.com/csp/article/K55102452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://support.f5.com/csp/article/K55102452" } ], "sourceIdentifier": "f5sirt@f5.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-01 18:15
Modified
2024-11-21 07:45
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://my.f5.com/manage/s/article/K37708118 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://my.f5.com/manage/s/article/K37708118 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23", "versionEndIncluding": "13.1.5", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DBB52D1-4FB8-4A71-8F83-02D7DDB99F60", "versionEndExcluding": "14.1.5.3", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "313014B4-8033-4B57-B838-66EE163E86D4", "versionEndExcluding": "15.1.7", "versionStartIncluding": "15.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "203B2B00-7DA5-443D-B4AA-DE0814D7E04D", "versionEndExcluding": "16.1.3.3", "versionStartIncluding": "16.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "93721140-2035-4431-BF5F-CA0C78BBFE53", "versionEndExcluding": "17.0.0.2", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9", "versionEndIncluding": "13.1.5", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE9B290B-21D9-40B0-8A6D-36F2C310C71A", "versionEndExcluding": "14.1.5.3", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E25D2597-32D7-4676-9A0C-FCAD8D8900A9", "versionEndExcluding": "15.1.7", "versionStartIncluding": "15.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F11221E1-8354-4854-A75D-060721E9671F", "versionEndExcluding": "16.1.3.3", "versionStartIncluding": "16.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FAB540A-6082-4F6E-9CDE-0AB719B1001F", "versionEndExcluding": "17.0.0.2", "versionStartIncluding": "17.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F510CA2D-E049-4884-AB80-EC03560556EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59AA4F5-B072-4866-9912-FCBB5F77F8EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "755CF51B-61AD-4C1E-9954-C44EC30E4339", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C37E575D-5674-4BD6-9C24-D318A905FD4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BE455B9-7497-42EE-A6D2-EFEB0E9B5589", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E0FBD3-584B-4E20-A664-AFC8B224466C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF87EE2-1A8A-4050-8168-C4C8A1E49AD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FA594DF-0441-4761-80AD-C3C64BD1BA59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EF35744-F9B6-43FD-804D-955EC5AC7360", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA95257-25F5-483A-BBE5-F906EAF2BCF9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "86E943FF-3EE2-4F87-B005-80432EB4FB67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD50226B-5D1A-44A0-B530-BBDB50CDC30F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF21909-A75A-42ED-AAF4-3BC3EE412BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B405FC13-0B14-4497-8BE8-E09CE5369DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "046B8D26-64B8-46C4-921A-983E0AE82752", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1685A2-60F2-4B06-A68E-FC2E18CF3BEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F5FE621-B69A-4E93-B5FB-AC7C47A73766", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC83C650-6120-4FD8-85FC-131B7E78F9FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4928A6CA-6FD3-405F-878F-12A199C54C03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E48A49B-586A-4585-8952-EBF30E8C726C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA9A1D2B-33AA-4691-9891-4360B9B026EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21BD097C-73F2-4EB7-9024-3DC63EC419D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A81F6A51-9AEF-4502-B19C-449CC9FA7154", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D524EE-B941-4D73-A83F-02C3253492D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C53B31C-E56F-4FD4-9B51-A741DA8FE479", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EDC8F7B-D052-4DAB-B572-17241E02DC01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B494DEE-B373-4B3F-95C1-2E0997F32B6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D400BBB2-399D-41C9-B73B-BDC280B5A51E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BC625D5-C59F-4D20-BA92-0EC85DAB8AFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B5D6038-EB49-47DE-BC4A-8E9888F217DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*", "matchCriteriaId": "4233544A-999C-42CD-9B61-E639AAA460B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "43CDBB9F-B6BD-4103-82E8-D66E067704C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "24DA75BA-A4B7-46BD-887D-03CDFAF22791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "612904C3-0EA5-4F56-BDFE-1A2114C28EEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B4EBB6-BEEB-42DA-A146-10E401226BED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF08F72-E905-48C4-9339-0F23EE462CC5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "55433400-8996-44B8-94D7-81690145EF94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8AB5834-CB4C-46AD-A0C6-E3800DE89453", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*", "matchCriteriaId": "5918B702-39A4-48F5-B381-7FFF0ABE4920", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F04564-25E9-4962-949D-6C810091464D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE3FCE60-4F2F-48FA-A0AC-89DE82118411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBFBFFE7-EA68-46E0-A172-FABDD99D7D8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*", "matchCriteriaId": "9940F471-FA88-49FB-B1BD-752366F9A15C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58A0DEB-F0C7-40BD-ACE3-49F0CD5663D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD814768-9507-4C58-9398-6898C3F49272", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83532FB3-30DE-44B9-A1B7-551F91E61C9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C0B96E2-7E5D-4C82-B4C5-3F35CD650962", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD6188-94B2-43BE-93C8-F2493E2C2C23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*", "matchCriteriaId": "776A5309-2A92-462B-9CAB-067F5E522386", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "id": "CVE-2023-22839", "lastModified": "2024-11-21T07:45:29.820", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "f5sirt@f5.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-01T18:15:11.750", "references": [ { "source": "f5sirt@f5.com", "tags": [ "Vendor Advisory" ], "url": "https://my.f5.com/manage/s/article/K37708118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://my.f5.com/manage/s/article/K37708118" } ], "sourceIdentifier": "f5sirt@f5.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "f5sirt@f5.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78198692-74E8-4289-B169-E64C1C50B71C", "versionEndExcluding": "sps_e5_04.01.04.275.0", "versionStartIncluding": "sps_e5_04.00.00.000.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DFD2B64-3374-4419-B102-42745E051F14", "versionEndExcluding": "sps_soc-a_04.00.04.191.0", "versionStartIncluding": "sps_soc-a_04.00.00.000.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33CEC3A1-D09B-4157-9AC7-1160997ADE80", "versionEndExcluding": "sps_soc-x_04.00.04.100.0", "versionStartIncluding": "sps_soc-x_04.00.00.000.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_b2250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58DB7299-1600-4868-A270-D4044889524B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_b2250:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D2CC5DE-7FAA-4987-BCF2-CB365CFE0C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_b4300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59F24979-7D0A-4BA9-85B2-D9DAF129C11D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_b4300:-:*:*:*:*:*:*:*", "matchCriteriaId": "8912E078-E8DC-4587-8B2F-9DC45A18E3CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_b4340n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "683F596C-FD78-4C8B-820A-CAA11463EE47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_b4340n:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDABDC7-4229-4AC0-AC12-53DE4AD77C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_b4450n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A07B4ABC-5C2C-4DC7-8983-DC6E0B090334", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_b4450n:-:*:*:*:*:*:*:*", "matchCriteriaId": "62CBE6F1-89DA-4514-83EA-4721453F5C11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F510CA2D-E049-4884-AB80-EC03560556EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10050s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EF6B375-272F-4F6B-A5F4-479EE809A89D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10050s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F74715E2-C704-4836-B2B3-FC89B1FC2C5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10150v-n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FECA5AC-6B6F-4C38-AD52-B6228A050044", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10150v-n:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A33692-B2BF-4602-85B4-E4B75AD6BD1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10200v-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E48DC368-92D5-49AB-BFB0-638FF4F4B6D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10200v-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "170C1520-13F7-466C-A485-63EE8745E9ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10250v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F305A2E-8CDC-400C-BAC0-1CE37AC30B0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10250v:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B6C9711-AFAE-4B01-BBAE-5499E4B3ED23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10350v-n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDFF2C7D-FC63-4044-9A70-130AE650140C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10350v-n:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEC3C68F-37C5-411E-8033-FDD4EF3DA339", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_12250v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3004259-DA6B-4BE6-91C0-51594269A56B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_12250v:-:*:*:*:*:*:*:*", "matchCriteriaId": "34177892-A95F-4512-ABA7-430526A2D1B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_2200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DB62EE4-943C-4279-BF38-C12B4563332F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_2200:-:*:*:*:*:*:*:*", "matchCriteriaId": "A046243E-10EC-42F8-8311-B24E37106056", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21BD097C-73F2-4EB7-9024-3DC63EC419D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A81F6A51-9AEF-4502-B19C-449CC9FA7154", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D524EE-B941-4D73-A83F-02C3253492D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C53B31C-E56F-4FD4-9B51-A741DA8FE479", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E48A49B-586A-4585-8952-EBF30E8C726C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA9A1D2B-33AA-4691-9891-4360B9B026EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EE39BF-86AA-498B-BF51-EDCD7BD01376", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3B5688-0235-4D4F-A26C-440FF24A1B43", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCB6C17-33AC-4E5E-8633-7490058CA51F", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D4FBBA-1D87-4CCB-ADB3-42514FB0CF45", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6A53E3C-3E09-4100-8D5A-10AD4973C230", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6917369-D3C2-42EB-B73B-F86CE2F17401", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "151ED6D1-AA85-4213-8F3A-8167CBEC4721", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F1C68BC-A3EF-4205-AD00-68CB3A8C65AF", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8BBC028-03DD-4412-9180-883E4252E132", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCAE28C2-0ADD-4FD0-A520-EFB764164DD8", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "596A35D8-3644-4C45-99AC-4D201F170B83", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D5AA99B-08E7-4959-A3B4-41AA527B4B22", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AC8FD5C-AE1A-4484-BB6F-EBB6A48D21F8", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC15881B-9C49-4E77-9FB6-A6E60D0BCAD3", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "36A213C6-D6E4-4F38-989D-81D3DFC11829", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB5A624E-40A1-4F75-8B9A-FA56510C19EE", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DC86A5F-C793-4848-901F-04BFB57A07F6", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0772A366-87B9-40EC-9F63-AE0FF0EF5002", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D4B5A46-AA7B-416F-BA97-76A0BA232C6F", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "59D9F39B-206B-4E76-A811-1CAA705A60EE", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BD61B6A-4E98-4D2C-92BC-FED15CEE39A6", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E5552A3-91CD-4B97-AD33-4F1FB4C8827A", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A53C692-D353-42E3-9148-F850DA11884F", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "05106312-E60D-4CF1-B4C8-6F1EF5AF8D75", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "70099A38-3B84-4C40-8590-BE6C8F7C21A7", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9A8A5C3-0C38-4F46-8F98-DC3B9C58D660", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "55C2EC23-E78F-4447-BACF-21FC36ABF155", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "A35AC237-573B-4309-87EF-3945FA2449BF", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "27ABD6A3-5D67-4543-BB90-602F17A98B52", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DE40473-ABAE-4D91-8EBB-FB5719E107F6", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "96E945EE-A623-4775-83B9-4CF81B7EA70F", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "945A19E8-51EB-42FE-9BF1-12DAC78B5286", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B6C3F50-BD60-4A8C-8DBB-680DA4D6BE6D", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1B2D963-4E55-45B5-80E0-BC6FFB2122F7", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "92484170-2E91-45F6-9789-B0DF3F5E6260", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB5007D0-BBDB-4D74-9C88-98FBA74757D1", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB07E847-6083-4CC8-8A62-6B9744B87088", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8BBD637-148A-4E1A-B2DC-129BCD121C1E", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF606356-8191-478D-AF60-D48A408CD9ED", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A16FE69-A466-4FA6-BDDA-794C9F2B36FD", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7725810-66D2-4460-A174-9F3BFAD966F2", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "0620AA57-83D1-41E6-8ABB-99F3FABB10F0", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "A93AAEB9-556E-4F94-ADEC-D9C294B7F37E", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA3E37E6-64B9-4668-AC01-933711E1C934", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "039E73A1-9F90-46A4-BFEE-5E97BAF3FAA6", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFD760FE-4347-4D36-B5C6-4009398060F2", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF552D91-612A-43E1-B2D6-02E2515FEA22", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C8D0EF7-9C65-4491-B358-DB1AAB0EA1FF", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CCD3CF9-EA9D-43FF-8ADA-713B4B5C468E", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "43581457-5C55-4B31-BEFA-4B59B2744BB8", "versionEndIncluding": "11.6.5", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "65B76F53-7D8B-477E-8B6E-91AC0A9009FF", "versionEndIncluding": "12.1.5", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "6704F0A6-16E2-4C2D-B5BD-EDDEAD5C153C", "versionEndIncluding": "13.1.3", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "79B0C4C9-FCA9-4108-B349-2EFBB4A1153B", "versionEndIncluding": "14.1.2", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC6612AB-E46B-4A8B-9B3E-C711D8C27962", "versionEndIncluding": "15.0.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Un problema l\u00f3gico en el subsistema para Intel\u00ae SPS versiones anteriores a SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 y SPS_SoC-A_04.00.04.191.0, puede permitir a un usuario privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2019-11109", "lastModified": "2024-11-21T04:20:33.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T22:15:13.127", "references": [ { "source": "secure@intel.com", "url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }