CERTFR-2026-AVI-0591

Vulnerability from certfr_avis - Published: 2026-05-15 - Updated: 2026-05-15

De multiples vulnérabilités ont été découvertes dans les produits F5. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
F5 N/A BIG-IP APM versions 17.1.0 à 17.1.3 antérieures à 17.1.3.1
F5 N/A BIG-IP DNS versions 17.1.0 à 17.1.3 antérieures à 17.1.3.1
F5 N/A BIG-IP Advanced WAF/ASM versions 17.1.0 à 17.1.3 antérieures à 17.1.3.1
F5 BIG-IP BIG-IP versions 17.1.0 à 17.1.3 antérieures à 17.1.3.1
F5 BIG-IP Next BIG-IP Next for Kubernetes versions 2.x antérieures à 2.2.0
F5 NGINX F5 DoS for NGINX versions 4.8.0
F5 BIG-IP BIG-IP versions 16.1.0 à 16.1.6 antérieures à 17.1.3
F5 N/A BIG-IP DNS versions 17.5.0 à 17.5.1 antérieures à 21.0.0
F5 BIG-IP Next BIG-IP Next SPK versions 1.7.0 à 1.7.16 antérieures à 1.7.17
F5 BIG-IP BIG-IP versions 21.0.x antérieures à 21.0.0.2
F5 N/A BIG-IP SSL Orchestrator versions 21.0.0 antérieures à 21.0.0.1 (SSL Orchestrator 13.1.3)
F5 BIG-IP Next BIG-IP Next SPK versions 2.0.0 à 2.0.2 antérieures à 2.0.3
F5 NGINX NGINX Open Source versions 1.0.0 à 1.30.0 antérieures à 1.30.1
F5 N/A BIG-IP BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender versions 17.1.0 à 17.1.3 antérieures à 17.1.3.1
F5 NGINX NGINX Gateway Fabric versions 1.3.0 à 1.6.2
F5 BIG-IP Next BIG-IP Next CNF versions 2.0.0 à 2.0.2 antérieures à 2.0.3
F5 NGINX NGINX App Protect DoS versions 4.3.0 à 4.7.0
F5 N/A BIG-IP APM versions 17.5.0 à 17.5.1 antérieures à 17.5.1.4
F5 NGINX NGINX App Protect WAF versions 4.9.0 à 4.16.0
F5 N/A BIG-IP SSL Orchestrator versions 17.1.0 à 17.1.3 antérieures à 17.1.3.1 (SSL Orchestrator 12.3.2)
F5 NGINX NGINX Ingress Controller versions 5.0.0 à 5.4.2
F5 BIG-IP BIG-IP versions 17.5.0 à 17.5.1 antérieures à 21.0.0.2
F5 NGINX NGINX Ingress Controller versions 3.5.0 à 3.7.2
F5 NGINX NGINX Open Source versions 0.3.50 à 0.9.7 antérieures à 1.30.1
F5 N/A BIG-IP DNS versions 21.0.x antérieures à 21.0.0.1
F5 NGINX NGINX Instance Manager versions 2.16.0 à 2.21.1
F5 N/A BIG-IP BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender versions 17.5.0 à 17.5.1 antérieures à 17.5.1.4
F5 NGINX NGINX Plus versions R36 antérieures à R36 P4
F5 BIG-IQ BIG-IQ Centralized Management versions 8.4.0 antérieures à 8.4.1
F5 N/A BIG-IP SSL Orchestrator versions 17.5.0 à 17.5.1 antérieures à 17.5.1.4 (SSL Orchestrator 12.3.2)
F5 BIG-IP Next BIG-IP Next CNF versions 1.1.0 à 1.4.0 antérieures à 1.4.1
F5 NGINX NGINX App Protect WAF versions 5.1.0 à 5.8.0
F5 NGINX NGINX Gateway Fabric versions 2.0.0 à 2.6.0
F5 NGINX NGINX Ingress Controller versions 4.0.0 à 4.0.1
F5 N/A BIG-IP PEM versions 17.1.0 à 17.1.3 antérieures à 17.1.3.1
F5 N/A BIG-IP APM versions 21.0.x antérieures à 21.0.0.1
F5 N/A BIG-IP DNS versions 16.1.0 à 16.1.6 antérieures à 17.1.3.1
F5 N/A BIG-IP PEM versions 21.0.x antérieures à 21.0.0.1
F5 N/A BIG-IP Advanced WAF/ASM versions 17.5.0 à 17.5.1 antérieures à 17.5.1.4
F5 N/A BIG-IP Advanced WAF/ASM versions 21.0.x antérieures à 21.0.0.1
F5 N/A BIG-IP PEM versions 17.5.0 à 17.5.1 antérieures à 17.5.1.4
F5 NGINX NGINX Plus versions R32 antérieures à R32 P6
F5 NGINX F5 WAF for NGINX versions 5.9.0 à 5.12.1
References
Bulletin de sécurité F5 K000160932 2026-05-13 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "BIG-IP APM versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP DNS versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP Advanced WAF/ASM versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1",
      "product": {
        "name": "BIG-IP",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP Next for Kubernetes versions 2.x ant\u00e9rieures \u00e0 2.2.0",
      "product": {
        "name": "BIG-IP Next",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "F5 DoS for NGINX versions 4.8.0",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP versions 16.1.0 \u00e0 16.1.6 ant\u00e9rieures \u00e0 17.1.3",
      "product": {
        "name": "BIG-IP",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP DNS versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 21.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP Next SPK versions 1.7.0 \u00e0 1.7.16 ant\u00e9rieures \u00e0 1.7.17",
      "product": {
        "name": "BIG-IP Next",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.2",
      "product": {
        "name": "BIG-IP",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP SSL Orchestrator versions 21.0.0 ant\u00e9rieures \u00e0 21.0.0.1 (SSL Orchestrator 13.1.3)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP Next SPK versions 2.0.0 \u00e0 2.0.2 ant\u00e9rieures \u00e0 2.0.3",
      "product": {
        "name": "BIG-IP Next",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Open Source versions 1.0.0 \u00e0 1.30.0 ant\u00e9rieures \u00e0 1.30.1",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Gateway Fabric versions 1.3.0 \u00e0 1.6.2",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP Next CNF versions 2.0.0 \u00e0 2.0.2 ant\u00e9rieures \u00e0 2.0.3",
      "product": {
        "name": "BIG-IP Next",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX App Protect DoS versions 4.3.0 \u00e0 4.7.0",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP APM versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX App Protect WAF versions 4.9.0 \u00e0 4.16.0",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP SSL Orchestrator versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1 (SSL Orchestrator 12.3.2)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Ingress Controller versions 5.0.0 \u00e0 5.4.2",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 21.0.0.2",
      "product": {
        "name": "BIG-IP",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Ingress Controller versions 3.5.0 \u00e0 3.7.2",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Open Source versions 0.3.50 \u00e0 0.9.7 ant\u00e9rieures \u00e0 1.30.1",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP DNS versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Instance Manager versions 2.16.0 \u00e0 2.21.1",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Plus versions R36 ant\u00e9rieures \u00e0 R36 P4",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IQ Centralized Management versions 8.4.0 ant\u00e9rieures \u00e0 8.4.1",
      "product": {
        "name": "BIG-IQ",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP SSL Orchestrator versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4 (SSL Orchestrator 12.3.2)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP Next CNF versions 1.1.0 \u00e0 1.4.0 ant\u00e9rieures \u00e0 1.4.1",
      "product": {
        "name": "BIG-IP Next",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX App Protect WAF versions 5.1.0 \u00e0 5.8.0",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Gateway Fabric versions 2.0.0 \u00e0 2.6.0",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Ingress Controller versions 4.0.0 \u00e0 4.0.1",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP PEM versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP APM versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP DNS versions 16.1.0 \u00e0 16.1.6 ant\u00e9rieures \u00e0 17.1.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP PEM versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP Advanced WAF/ASM versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP Advanced WAF/ASM versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "BIG-IP PEM versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "NGINX Plus versions R32 ant\u00e9rieures \u00e0 R32 P6",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    },
    {
      "description": "F5 WAF for NGINX versions 5.9.0 \u00e0 5.12.1",
      "product": {
        "name": "NGINX",
        "vendor": {
          "name": "F5",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2026-41227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41227"
    },
    {
      "name": "CVE-2026-39458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-39458"
    },
    {
      "name": "CVE-2026-42781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42781"
    },
    {
      "name": "CVE-2026-42780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42780"
    },
    {
      "name": "CVE-2026-40701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40701"
    },
    {
      "name": "CVE-2026-42920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42920"
    },
    {
      "name": "CVE-2026-42409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42409"
    },
    {
      "name": "CVE-2026-42946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42946"
    },
    {
      "name": "CVE-2026-42937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42937"
    },
    {
      "name": "CVE-2026-42919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42919"
    },
    {
      "name": "CVE-2026-42934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42934"
    },
    {
      "name": "CVE-2026-42406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42406"
    },
    {
      "name": "CVE-2026-40435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40435"
    },
    {
      "name": "CVE-2026-34176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-34176"
    },
    {
      "name": "CVE-2026-40629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40629"
    },
    {
      "name": "CVE-2026-32673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-32673"
    },
    {
      "name": "CVE-2026-41953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41953"
    },
    {
      "name": "CVE-2026-40061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40061"
    },
    {
      "name": "CVE-2026-42924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42924"
    },
    {
      "name": "CVE-2026-41225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41225"
    },
    {
      "name": "CVE-2026-35062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-35062"
    },
    {
      "name": "CVE-2026-40423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40423"
    },
    {
      "name": "CVE-2026-34019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-34019"
    },
    {
      "name": "CVE-2026-42926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42926"
    },
    {
      "name": "CVE-2026-20916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-20916"
    },
    {
      "name": "CVE-2026-41957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41957"
    },
    {
      "name": "CVE-2026-39455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-39455"
    },
    {
      "name": "CVE-2026-40618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40618"
    },
    {
      "name": "CVE-2026-40631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40631"
    },
    {
      "name": "CVE-2026-32643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-32643"
    },
    {
      "name": "CVE-2026-41217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41217"
    },
    {
      "name": "CVE-2026-40698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40698"
    },
    {
      "name": "CVE-2026-39459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-39459"
    },
    {
      "name": "CVE-2026-40703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40703"
    },
    {
      "name": "CVE-2026-28758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-28758"
    },
    {
      "name": "CVE-2026-41954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41954"
    },
    {
      "name": "CVE-2026-40699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40699"
    },
    {
      "name": "CVE-2026-40462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40462"
    },
    {
      "name": "CVE-2026-41219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41219"
    },
    {
      "name": "CVE-2026-24464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-24464"
    },
    {
      "name": "CVE-2026-40067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40067"
    },
    {
      "name": "CVE-2026-42063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42063"
    },
    {
      "name": "CVE-2026-42408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42408"
    },
    {
      "name": "CVE-2026-40060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40060"
    },
    {
      "name": "CVE-2026-42945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42945"
    },
    {
      "name": "CVE-2026-41956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41956"
    },
    {
      "name": "CVE-2026-41218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41218"
    },
    {
      "name": "CVE-2026-41959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-41959"
    },
    {
      "name": "CVE-2026-42930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42930"
    },
    {
      "name": "CVE-2026-40460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-40460"
    },
    {
      "name": "CVE-2026-42058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-42058"
    }
  ],
  "initial_release_date": "2026-05-15T00:00:00",
  "last_revision_date": "2026-05-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2026-AVI-0591",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2026-05-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits F5. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F5",
  "vendor_advisories": [
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 F5 K000160932",
      "url": "https://my.f5.com/manage/s/article/K000160932"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…