NCSC-2026-0162

Vulnerability from csaf_ncscnl - Published: 2026-05-15 12:07 - Updated: 2026-05-15 12:07
Summary
Kwetsbaarheden verholpen in F5 BIG-IP en BIG-IQ producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions: NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein. NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory. This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: F5 heeft meerdere kwetsbaarheden verholpen in de BIG-IP en BIG-IQ productlijnen, inclusief componenten zoals iControl REST, iControl SOAP, TMOS Shell, Traffic Management Microkernel (TMM), Configuration utility, Advanced WAF, ASM, PEM, DNS, Access Policy Manager (APM) en SSL Orchestrator.
Interpretaties: De kwetsbaarheden betreffen onder andere directory traversal, ongeautoriseerde bestandswijzigingen, blootstelling van gevoelige SSH-wachtwoorden in API-responses en auditlogs, privilege escalatie via onjuiste permissie-toewijzingen, remote command injection, cross-account informatielekken, en onverwachte procesafsluitingen (zoals van TMM, httpd, apmd en bd processen) door specifieke configuraties of ongedocumenteerde verkeerspatronen. Exploitatie vereist doorgaans geauthenticeerde toegang met rollen variërend van Manager, Resource Administrator tot Administrator, afhankelijk van de kwetsbaarheid. Sommige kwetsbaarheden maken het mogelijk om configuratieobjecten te wijzigen, wat kan leiden tot het uitvoeren van willekeurige commando's met verhoogde privileges. Andere kwetsbaarheden betreffen het lekken van gevoelige informatie via onjuiste toegangscontrole of onvoldoende validatie binnen managementinterfaces. Diverse kwetsbaarheden zijn specifiek voor Appliance mode of bepaalde configuratieprofielen zoals SSL, HTTP/2, SIP, LDAP authenticatie, en SNMP configuraties. De impact omvat onder meer het omzeilen van beveiligingscontroles, het escaleren van privileges, het lekken van gevoelige gegevens, en het verstoren van de beschikbaarheid en stabiliteit van netwerk- en applicatiebeheercomponenten. Niet-ondersteunde softwareversies zijn in de meeste gevallen niet geëvalueerd voor deze kwetsbaarheden.
Oplossingen: F5 heeft updates uitgebracht om de kwetsbaarheden in de BIG-IP en BIG-IQ producten te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-35: Path Traversal: '.../...//'
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-121: Stack-based Buffer Overflow
CWE-131: Incorrect Calculation of Buffer Size
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-250: Execution with Unnecessary Privileges
CWE-252: Unchecked Return Value
CWE-266: Incorrect Privilege Assignment
CWE-267: Privilege Defined With Unsafe Actions
CWE-272: Least Privilege Violation
CWE-312: Cleartext Storage of Sensitive Information
CWE-352: Cross-Site Request Forgery (CSRF)
CWE-416: Use After Free
CWE-420: Unprotected Alternate Channel
CWE-476: NULL Pointer Dereference
CWE-502: Deserialization of Untrusted Data
CWE-532: Insertion of Sensitive Information into Log File
CWE-552: Files or Directories Accessible to External Parties
CWE-643: Improper Neutralization of Data within XPath Expressions ('XPath Injection')
CWE-648: Incorrect Use of Privileged APIs
CWE-732: Incorrect Permission Assignment for Critical Resource
CWE-770: Allocation of Resources Without Limits or Throttling
CWE-772: Missing Release of Resource after Effective Lifetime
CWE-824: Access of Uninitialized Pointer
CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')

A directory traversal vulnerability in an undisclosed iControl REST endpoint in Appliance mode may allow an authenticated administrator to bypass security boundaries and delete files.

CWE-35 - Path Traversal: '.../...//'
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in BIG-IP DNS's gtm_add and bigip_add iControl REST commands exposes the ssh-password parameter in cleartext within responses and audit logs, risking sensitive information disclosure to highly privileged attackers.

CWE-312 - Cleartext Storage of Sensitive Information
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in BIG-IP and BIG-IQ systems allows a highly privileged, authenticated attacker with at least the Certificate Manager role to modify configuration objects and execute arbitrary commands, excluding versions past End of Technical Support.

CWE-250 - Execution with Unnecessary Privileges
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in BIG-IP scripted monitors allows authenticated users with Resource Administrator or Administrator roles to execute arbitrary system commands with elevated privileges, potentially crossing security boundaries in appliance mode.

CWE-250 - Execution with Unnecessary Privileges
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

An authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint in Appliance mode, potentially allowing an attacker to cross security boundaries.

CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

An authenticated iControl SOAP user may be able to access or obtain information from other accounts, with versions past End of Technical Support not evaluated.

CWE-266 - Incorrect Privilege Assignment
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring the BIG-IP Configuration utility to use LDAP authentication can cause the httpd process to exhaust available file descriptors due to undisclosed traffic, with unsupported software versions not evaluated.

CWE-772 - Missing Release of Resource after Effective Lifetime
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Enabling a BIG-IP DNS profile with DNS cache on a virtual server can cause the Traffic Management Microkernel (TMM) to terminate due to undisclosed traffic, with unsupported software versions not evaluated.

CWE-824 - Access of Uninitialized Pointer
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in iControl REST and TMOS Shell (tmsh) allows a highly privileged, authenticated attacker with at least Manager role to create configuration objects that enable execution of arbitrary commands.

CWE-272 - Least Privilege Violation
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Certain undisclosed requests can cause the bd process to terminate when a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, with unsupported software versions not evaluated.

CWE-252 - Unchecked Return Value
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in BIG-IP DNS allows authenticated Resource Administrator or Administrator users to execute arbitrary system commands with elevated privileges, potentially crossing security boundaries in Appliance mode.

CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring a BIG-IP APM access policy on a virtual server can cause the apmd process to terminate due to undisclosed traffic, with unsupported software versions not evaluated.

CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring a SIP profile on a virtual server can cause the Traffic Management Microkernel (TMM) to terminate due to undisclosed traffic, with issues noted in software versions beyond End of Technical Support (EoTS).

CWE-770 - Allocation of Resources Without Limits or Throttling
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

IP-based access restrictions configured for httpd do not apply to all endpoints, potentially allowing connections from blocked IP addresses, except in versions that have reached End of Technical Support.

CWE-420 - Unprotected Alternate Channel
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Incorrect permission assignment vulnerabilities in iControl REST and TMOS Shell (tmsh) undisclosed commands may allow authenticated attackers to access sensitive information.

CWE-732 - Incorrect Permission Assignment for Critical Resource
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring an SSL profile on BIG-IP Virtual Edition without Intel QAT or on hardware with crypto.hwacceleration disabled can cause the Traffic Management Microkernel (TMM) to terminate when processing certain undisclosed traffic.

CWE-131 - Incorrect Calculation of Buffer Size
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring SSL profiles on a virtual server can cause the server to stop processing new client connections when handling undisclosed traffic, with versions beyond End of Technical Support not evaluated.

CWE-770 - Allocation of Resources Without Limits or Throttling
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

An authenticated attacker with Resource Administrator or Administrator roles can exploit iControl SOAP to modify configuration objects and escalate privileges, with unsupported software versions not evaluated.

CWE-552 - Files or Directories Accessible to External Parties
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in F5 BIG-IP and BIG-IQ systems allows a highly privileged, authenticated attacker with Resource Administrator role to create SNMP configuration objects via iControl REST or TMOS shell, resulting in privilege escalation.

CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in undisclosed pages of the Configuration utility may allow a low-privileged authenticated attacker to access sensitive information, with unsupported software versions not evaluated.

CWE-643 - Improper Neutralization of Data within XPath Expressions ('XPath Injection')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A cross-site request forgery (CSRF) vulnerability exists in the dashboard of the BIG-IP Configuration utility, with versions that have reached End of Technical Support (EoTS) not evaluated.

CWE-352 - Cross-Site Request Forgery (CSRF)
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in an undisclosed BIG-IP TMOS Shell command allows authenticated users with resource administrator or administrator roles to execute arbitrary system commands with elevated privileges, potentially crossing security boundaries in Appliance mode.

CWE-732 - Incorrect Permission Assignment for Critical Resource
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring BIG-IP PEM iRules with certain commands on a virtual server can cause the Traffic Management Microkernel (TMM) to terminate, with unsupported software versions not evaluated.

CWE-416 - Use After Free
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

An improper sanitization vulnerability in the BIG-IP QKView utility allows low-privileged attackers to read sensitive information from QKView files, with unsupported software versions not evaluated.

CWE-532 - Insertion of Sensitive Information into Log File
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in iControl REST allows a highly privileged, authenticated attacker with at least Manager role to create configuration objects that enable arbitrary command execution.

CWE-648 - Incorrect Use of Privileged APIs
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Certain undisclosed traffic on an HTTP/2 virtual server with Layer 7 DoS Protection can increase memory usage and cause the Traffic Management Microkernel (TMM) process to terminate.

CWE-770 - Allocation of Resources Without Limits or Throttling
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in BIG-IP systems enables a highly privileged, authenticated attacker with at least Resource Administrator role to modify configuration objects, resulting in privilege escalation.

CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A sensitive information disclosure vulnerability in an undisclosed iControl REST endpoint and TMOS Shell (tmsh) command may allow an authenticated attacker with resource administrator privileges to access sensitive information.

Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring a classification profile on a UDP virtual server can cause the Traffic Management Microkernel (TMM) to terminate upon receiving certain undisclosed requests, with unsupported software versions not evaluated.

CWE-121 - Stack-based Buffer Overflow
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

An authenticated remote code execution vulnerability exists in the BIG-IP and BIG-IQ Configuration utility through undisclosed vectors, excluding software versions that have reached End of Technical Support.

CWE-502 - Deserialization of Untrusted Data
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Incorrect permission assignment vulnerabilities in BIG-IP and BIG-IQ TMOS Shell (tmsh) network diagnostics commands and BIG-IP iControl REST may allow authenticated attackers to view network status of destination systems.

CWE-732 - Incorrect Permission Assignment for Critical Resource
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

An authenticated attacker can exploit undisclosed requests to BIG-IP iControl REST to leak local user account names, with unsupported software versions not evaluated.

CWE-732 - Incorrect Permission Assignment for Critical Resource
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in iControl SOAP allows authenticated users with Resource Administrator or Administrator roles to download sensitive files, with unsupported software versions not evaluated.

CWE-552 - Files or Directories Accessible to External Parties
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in BIG-IP and BIG-IQ systems allows a highly privileged, authenticated attacker with the Certificate Manager role to modify configuration objects and execute arbitrary commands, excluding versions past End of Technical Support.

CWE-267 - Privilege Defined With Unsafe Actions
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in an undisclosed TMOS Shell (tmsh) command in BIG-IP DNS may allow a highly privileged authenticated attacker to view sensitive information.

CWE-312 - Cleartext Storage of Sensitive Information
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring an HTTP/2 profile with an iRule using HTTP::redirect or HTTP::respond on a virtual server can cause the Traffic Management Microkernel (TMM) process to terminate due to certain request handling issues.

CWE-476 - NULL Pointer Dereference
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A directory traversal vulnerability in BIG-IP SSL Orchestrator allows an authenticated high-privilege attacker to overwrite, delete, or corrupt arbitrary local files, affecting supported software versions.

CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring embedded Packet Velocity Acceleration (ePVA) can increase resource utilization in ePVA and Traffic Management Microkernel (TMM) due to undisclosed local ethernet traffic, with unsupported software versions not evaluated.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

A vulnerability in BIG-IP systems allows an authenticated attacker with administrative access to escalate privileges and cross security boundaries, with unsupported software versions not evaluated.

CWE-121 - Stack-based Buffer Overflow
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Configuring a Client SSL profile with Allow Dynamic Record Sizing on a UDP virtual server can cause the Traffic Management Microkernel (TMM) to terminate due to undisclosed traffic issues.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

An authenticated attacker with Resource Administrator or Administrator roles can exploit iControl SOAP to create SNMP configuration objects, leading to privilege escalation.

CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

An authenticated attacker with Administrator privileges may bypass Appliance mode restrictions on a BIG-IP system, including some unsupported software versions not evaluated.

CWE-35 - Path Traversal: '.../...//'
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*

Incorrect permission assignment vulnerabilities in BIG-IP and BIG-IQ TMOS Shell arp and ndp commands, as well as in BIG-IP iControl REST, may allow an authenticated attacker to access adjacent network information.

CWE-732 - Incorrect Permission Assignment for Critical Resource
Affected products
Product Identifier Version Remediation
vers:unknown/*
F5 / AI Gateway
vers:unknown/*
vers:unknown/*
F5 / BIG-IP
vers:unknown/*
vers:unknown/*
F5 / BIG-IP APM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender
vers:unknown/*
vers:unknown/*
F5 / BIG-IP DNS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next CNF
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next SPK
vers:unknown/*
vers:unknown/*
F5 / BIG-IP Next for Kubernetes
vers:unknown/*
vers:unknown/*
F5 / BIG-IP PEM
vers:unknown/*
vers:unknown/*
F5 / BIG-IP SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX110 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on BX520 blades on VELOS
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on all other rSeries systems
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r10000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r12000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IP tenants on r5000 rSeries
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ
vers:unknown/*
vers:unknown/*
F5 / BIG-IQ Centralized Management
vers:unknown/*
vers:unknown/*
F5 / Distributed Cloud (all services)
vers:unknown/*
vers:unknown/*
F5 / NGINX (all products)
vers:unknown/*
vers:unknown/*
F5 / OS-A
vers:unknown/*
vers:unknown/*
F5 / OS-C
vers:unknown/*
vers:unknown/*
F5 / SSL Orchestrator
vers:unknown/*
vers:unknown/*
F5 / Silverline (all services)
vers:unknown/*
vers:unknown/*
F5 / Traffix SDC
vers:unknown/*
References
URL Category
https://my.f5.com/manage/s/article/K000160975 external
https://my.f5.com/manage/s/article/K000160979 external
https://my.f5.com/manage/s/article/K000160981 external
https://my.f5.com/manage/s/article/K000161018 external
https://my.f5.com/manage/s/article/K000161022 external
https://my.f5.com/manage/s/article/K000161023 external
https://my.f5.com/manage/s/article/K000161040 external
https://my.f5.com/manage/s/article/K000161056 external
https://my.f5.com/manage/s/article/K000161107 external
https://my.f5.com/manage/s/article/K000149743 external
https://my.f5.com/manage/s/article/K000156581 external
https://my.f5.com/manage/s/article/K000156604 external
https://my.f5.com/manage/s/article/K000156761 external
https://my.f5.com/manage/s/article/K000156734 external
https://my.f5.com/manage/s/article/K000157895 external
https://my.f5.com/manage/s/article/K000157981 external
https://my.f5.com/manage/s/article/K000158038 external
https://my.f5.com/manage/s/article/K000158070 external
https://my.f5.com/manage/s/article/K000158082 external
https://my.f5.com/manage/s/article/K000158971 external
https://my.f5.com/manage/s/article/K000158978 external
https://my.f5.com/manage/s/article/K000158979 external
https://my.f5.com/manage/s/article/K000159021 external
https://my.f5.com/manage/s/article/K000159034 external
https://my.f5.com/manage/s/article/K000160727 external
https://my.f5.com/manage/s/article/K000160788 external
https://my.f5.com/manage/s/article/K000160857 external
https://my.f5.com/manage/s/article/K000160862 external
https://my.f5.com/manage/s/article/K000160863 external
https://my.f5.com/manage/s/article/K000160874 external
https://my.f5.com/manage/s/article/K000160875 external
https://my.f5.com/manage/s/article/K000160876 external
https://my.f5.com/manage/s/article/K000160901 external
https://my.f5.com/manage/s/article/K000160903 external
https://my.f5.com/manage/s/article/K000160911 external
https://my.f5.com/manage/s/article/K000160916 external
https://my.f5.com/manage/s/article/K000160926 external
https://my.f5.com/manage/s/article/K000160945 external
https://my.f5.com/manage/s/article/K000160971 external
https://my.f5.com/manage/s/article/K000160972 external
https://my.f5.com/manage/s/article/K000160973 external
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self
https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-… self

{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "F5 heeft meerdere kwetsbaarheden verholpen in de BIG-IP en BIG-IQ productlijnen, inclusief componenten zoals iControl REST, iControl SOAP, TMOS Shell, Traffic Management Microkernel (TMM), Configuration utility, Advanced WAF, ASM, PEM, DNS, Access Policy Manager (APM) en SSL Orchestrator.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden betreffen onder andere directory traversal, ongeautoriseerde bestandswijzigingen, blootstelling van gevoelige SSH-wachtwoorden in API-responses en auditlogs, privilege escalatie via onjuiste permissie-toewijzingen, remote command injection, cross-account informatielekken, en onverwachte procesafsluitingen (zoals van TMM, httpd, apmd en bd processen) door specifieke configuraties of ongedocumenteerde verkeerspatronen.\n\nExploitatie vereist doorgaans geauthenticeerde toegang met rollen vari\u00ebrend van Manager, Resource Administrator tot Administrator, afhankelijk van de kwetsbaarheid. Sommige kwetsbaarheden maken het mogelijk om configuratieobjecten te wijzigen, wat kan leiden tot het uitvoeren van willekeurige commando\u0027s met verhoogde privileges.\n\nAndere kwetsbaarheden betreffen het lekken van gevoelige informatie via onjuiste toegangscontrole of onvoldoende validatie binnen managementinterfaces. Diverse kwetsbaarheden zijn specifiek voor Appliance mode of bepaalde configuratieprofielen zoals SSL, HTTP/2, SIP, LDAP authenticatie, en SNMP configuraties. De impact omvat onder meer het omzeilen van beveiligingscontroles, het escaleren van privileges, het lekken van gevoelige gegevens, en het verstoren van de beschikbaarheid en stabiliteit van netwerk- en applicatiebeheercomponenten. Niet-ondersteunde softwareversies zijn in de meeste gevallen niet ge\u00ebvalueerd voor deze kwetsbaarheden.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "F5 heeft updates uitgebracht om de kwetsbaarheden in de BIG-IP en BIG-IQ producten te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Path Traversal: \u0027.../...//\u0027",
        "title": "CWE-35"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
        "title": "CWE-77"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Incorrect Calculation of Buffer Size",
        "title": "CWE-131"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Execution with Unnecessary Privileges",
        "title": "CWE-250"
      },
      {
        "category": "general",
        "text": "Unchecked Return Value",
        "title": "CWE-252"
      },
      {
        "category": "general",
        "text": "Incorrect Privilege Assignment",
        "title": "CWE-266"
      },
      {
        "category": "general",
        "text": "Privilege Defined With Unsafe Actions",
        "title": "CWE-267"
      },
      {
        "category": "general",
        "text": "Least Privilege Violation",
        "title": "CWE-272"
      },
      {
        "category": "general",
        "text": "Cleartext Storage of Sensitive Information",
        "title": "CWE-312"
      },
      {
        "category": "general",
        "text": "Cross-Site Request Forgery (CSRF)",
        "title": "CWE-352"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "Unprotected Alternate Channel",
        "title": "CWE-420"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Insertion of Sensitive Information into Log File",
        "title": "CWE-532"
      },
      {
        "category": "general",
        "text": "Files or Directories Accessible to External Parties",
        "title": "CWE-552"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)",
        "title": "CWE-643"
      },
      {
        "category": "general",
        "text": "Incorrect Use of Privileged APIs",
        "title": "CWE-648"
      },
      {
        "category": "general",
        "text": "Incorrect Permission Assignment for Critical Resource",
        "title": "CWE-732"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Missing Release of Resource after Effective Lifetime",
        "title": "CWE-772"
      },
      {
        "category": "general",
        "text": "Access of Uninitialized Pointer",
        "title": "CWE-824"
      },
      {
        "category": "general",
        "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
        "title": "CWE-835"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160975"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160979"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160981"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000161018"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000161022"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000161023"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000161040"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000161056"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000161107"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000149743"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000156581"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000156604"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000156761"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000156734"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000157895"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000157981"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000158038"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000158070"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000158082"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000158971"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000158978"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000158979"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000159021"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000159034"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160727"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160788"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160857"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160862"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160863"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160874"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160875"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160876"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160901"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160903"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160911"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160916"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160926"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160945"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160971"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160972"
      },
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://my.f5.com/manage/s/article/K000160973"
      }
    ],
    "title": "Kwetsbaarheden verholpen in F5 BIG-IP en BIG-IQ producten",
    "tracking": {
      "current_release_date": "2026-05-15T12:07:48.313135Z",
      "generator": {
        "date": "2025-08-04T16:30:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.3"
        }
      },
      "id": "NCSC-2026-0162",
      "initial_release_date": "2026-05-15T12:07:48.313135Z",
      "revision_history": [
        {
          "date": "2026-05-15T12:07:48.313135Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-1"
                }
              }
            ],
            "category": "product_name",
            "name": "AI Gateway"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-2"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-3"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP APM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-4"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP Advanced WAF/ASM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-5"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-6"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP DNS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-7"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP Next CNF"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-8"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP Next SPK"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-9"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP Next for Kubernetes"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-10"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP PEM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-11"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP SSL Orchestrator"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-12"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP tenants on BX110 blades on VELOS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-13"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP tenants on BX520 blades on VELOS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-14"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP tenants on all other  rSeries systems"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-15"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP tenants on r10000 rSeries"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-16"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP tenants on r12000 rSeries"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-17"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IP tenants on r5000 rSeries"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-18"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IQ"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-19"
                }
              }
            ],
            "category": "product_name",
            "name": "BIG-IQ Centralized Management"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-20"
                }
              }
            ],
            "category": "product_name",
            "name": "Distributed Cloud (all services)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-21"
                }
              }
            ],
            "category": "product_name",
            "name": "NGINX (all products)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-22"
                }
              }
            ],
            "category": "product_name",
            "name": "OS-A"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-23"
                }
              }
            ],
            "category": "product_name",
            "name": "OS-C"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-24"
                }
              }
            ],
            "category": "product_name",
            "name": "SSL Orchestrator"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-25"
                }
              }
            ],
            "category": "product_name",
            "name": "Silverline (all services)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-26"
                }
              }
            ],
            "category": "product_name",
            "name": "Traffix SDC"
          }
        ],
        "category": "vendor",
        "name": "F5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-24464",
      "cwe": {
        "id": "CWE-35",
        "name": "Path Traversal: \u0027.../...//\u0027"
      },
      "notes": [
        {
          "category": "other",
          "text": "Path Traversal: \u0027.../...//\u0027",
          "title": "CWE-35"
        },
        {
          "category": "description",
          "text": "A directory traversal vulnerability in an undisclosed iControl REST endpoint in Appliance mode may allow an authenticated administrator to bypass security boundaries and delete files.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-24464 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-24464.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-24464"
    },
    {
      "cve": "CVE-2026-28758",
      "cwe": {
        "id": "CWE-312",
        "name": "Cleartext Storage of Sensitive Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Cleartext Storage of Sensitive Information",
          "title": "CWE-312"
        },
        {
          "category": "description",
          "text": "A vulnerability in BIG-IP DNS\u0027s gtm_add and bigip_add iControl REST commands exposes the ssh-password parameter in cleartext within responses and audit logs, risking sensitive information disclosure to highly privileged attackers.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-28758 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28758.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-28758"
    },
    {
      "cve": "CVE-2026-32643",
      "cwe": {
        "id": "CWE-250",
        "name": "Execution with Unnecessary Privileges"
      },
      "notes": [
        {
          "category": "other",
          "text": "Execution with Unnecessary Privileges",
          "title": "CWE-250"
        },
        {
          "category": "description",
          "text": "A vulnerability in BIG-IP and BIG-IQ systems allows a highly privileged, authenticated attacker with at least the Certificate Manager role to modify configuration objects and execute arbitrary commands, excluding versions past End of Technical Support.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-32643 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-32643.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-32643"
    },
    {
      "cve": "CVE-2026-32673",
      "cwe": {
        "id": "CWE-250",
        "name": "Execution with Unnecessary Privileges"
      },
      "notes": [
        {
          "category": "other",
          "text": "Execution with Unnecessary Privileges",
          "title": "CWE-250"
        },
        {
          "category": "description",
          "text": "A vulnerability in BIG-IP scripted monitors allows authenticated users with Resource Administrator or Administrator roles to execute arbitrary system commands with elevated privileges, potentially crossing security boundaries in appliance mode.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-32673 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-32673.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-32673"
    },
    {
      "cve": "CVE-2026-34176",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        },
        {
          "category": "description",
          "text": "An authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint in Appliance mode, potentially allowing an attacker to cross security boundaries.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-34176 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34176.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-34176"
    },
    {
      "cve": "CVE-2026-35062",
      "cwe": {
        "id": "CWE-266",
        "name": "Incorrect Privilege Assignment"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Privilege Assignment",
          "title": "CWE-266"
        },
        {
          "category": "description",
          "text": "An authenticated iControl SOAP user may be able to access or obtain information from other accounts, with versions past End of Technical Support not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-35062 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-35062.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-35062"
    },
    {
      "cve": "CVE-2026-39455",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        },
        {
          "category": "description",
          "text": "Configuring the BIG-IP Configuration utility to use LDAP authentication can cause the httpd process to exhaust available file descriptors due to undisclosed traffic, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-39455 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-39455.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-39455"
    },
    {
      "cve": "CVE-2026-39458",
      "cwe": {
        "id": "CWE-824",
        "name": "Access of Uninitialized Pointer"
      },
      "notes": [
        {
          "category": "other",
          "text": "Access of Uninitialized Pointer",
          "title": "CWE-824"
        },
        {
          "category": "description",
          "text": "Enabling a BIG-IP DNS profile with DNS cache on a virtual server can cause the Traffic Management Microkernel (TMM) to terminate due to undisclosed traffic, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-39458 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-39458.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-39458"
    },
    {
      "cve": "CVE-2026-39459",
      "cwe": {
        "id": "CWE-272",
        "name": "Least Privilege Violation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Least Privilege Violation",
          "title": "CWE-272"
        },
        {
          "category": "description",
          "text": "A vulnerability in iControl REST and TMOS Shell (tmsh) allows a highly privileged, authenticated attacker with at least Manager role to create configuration objects that enable execution of arbitrary commands.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-39459 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-39459.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-39459"
    },
    {
      "cve": "CVE-2026-40060",
      "cwe": {
        "id": "CWE-252",
        "name": "Unchecked Return Value"
      },
      "notes": [
        {
          "category": "other",
          "text": "Unchecked Return Value",
          "title": "CWE-252"
        },
        {
          "category": "description",
          "text": "Certain undisclosed requests can cause the bd process to terminate when a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40060 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40060.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40060"
    },
    {
      "cve": "CVE-2026-40061",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
          "title": "CWE-77"
        },
        {
          "category": "description",
          "text": "A vulnerability in BIG-IP DNS allows authenticated Resource Administrator or Administrator users to execute arbitrary system commands with elevated privileges, potentially crossing security boundaries in Appliance mode.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40061 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40061.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40061"
    },
    {
      "cve": "CVE-2026-40067",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "description",
          "text": "Configuring a BIG-IP APM access policy on a virtual server can cause the apmd process to terminate due to undisclosed traffic, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40067 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40067.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40067"
    },
    {
      "cve": "CVE-2026-40423",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "description",
          "text": "Configuring a SIP profile on a virtual server can cause the Traffic Management Microkernel (TMM) to terminate due to undisclosed traffic, with issues noted in software versions beyond End of Technical Support (EoTS).",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40423 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40423.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40423"
    },
    {
      "cve": "CVE-2026-40435",
      "cwe": {
        "id": "CWE-420",
        "name": "Unprotected Alternate Channel"
      },
      "notes": [
        {
          "category": "other",
          "text": "Unprotected Alternate Channel",
          "title": "CWE-420"
        },
        {
          "category": "description",
          "text": "IP-based access restrictions configured for httpd do not apply to all endpoints, potentially allowing connections from blocked IP addresses, except in versions that have reached End of Technical Support.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40435 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40435.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40435"
    },
    {
      "cve": "CVE-2026-40462",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        },
        {
          "category": "description",
          "text": "Incorrect permission assignment vulnerabilities in iControl REST and TMOS Shell (tmsh) undisclosed commands may allow authenticated attackers to access sensitive information.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40462 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40462.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40462"
    },
    {
      "cve": "CVE-2026-40618",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Calculation of Buffer Size",
          "title": "CWE-131"
        },
        {
          "category": "description",
          "text": "Configuring an SSL profile on BIG-IP Virtual Edition without Intel QAT or on hardware with crypto.hwacceleration disabled can cause the Traffic Management Microkernel (TMM) to terminate when processing certain undisclosed traffic.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40618 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40618.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40618"
    },
    {
      "cve": "CVE-2026-40629",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "description",
          "text": "Configuring SSL profiles on a virtual server can cause the server to stop processing new client connections when handling undisclosed traffic, with versions beyond End of Technical Support not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40629 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40629.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40629"
    },
    {
      "cve": "CVE-2026-40631",
      "cwe": {
        "id": "CWE-552",
        "name": "Files or Directories Accessible to External Parties"
      },
      "notes": [
        {
          "category": "other",
          "text": "Files or Directories Accessible to External Parties",
          "title": "CWE-552"
        },
        {
          "category": "description",
          "text": "An authenticated attacker with Resource Administrator or Administrator roles can exploit iControl SOAP to modify configuration objects and escalate privileges, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40631 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40631.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40631"
    },
    {
      "cve": "CVE-2026-40698",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
          "title": "CWE-77"
        },
        {
          "category": "description",
          "text": "A vulnerability in F5 BIG-IP and BIG-IQ systems allows a highly privileged, authenticated attacker with Resource Administrator role to create SNMP configuration objects via iControl REST or TMOS shell, resulting in privilege escalation.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40698 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40698.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40698"
    },
    {
      "cve": "CVE-2026-40699",
      "cwe": {
        "id": "CWE-643",
        "name": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Data within XPath Expressions (\u0027XPath Injection\u0027)",
          "title": "CWE-643"
        },
        {
          "category": "description",
          "text": "A vulnerability in undisclosed pages of the Configuration utility may allow a low-privileged authenticated attacker to access sensitive information, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40699 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40699.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40699"
    },
    {
      "cve": "CVE-2026-40703",
      "cwe": {
        "id": "CWE-352",
        "name": "Cross-Site Request Forgery (CSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Cross-Site Request Forgery (CSRF)",
          "title": "CWE-352"
        },
        {
          "category": "description",
          "text": "A cross-site request forgery (CSRF) vulnerability exists in the dashboard of the BIG-IP Configuration utility, with versions that have reached End of Technical Support (EoTS) not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40703 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40703.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-40703"
    },
    {
      "cve": "CVE-2026-41217",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        },
        {
          "category": "description",
          "text": "A vulnerability in an undisclosed BIG-IP TMOS Shell command allows authenticated users with resource administrator or administrator roles to execute arbitrary system commands with elevated privileges, potentially crossing security boundaries in Appliance mode.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41217 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41217.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.9,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41217"
    },
    {
      "cve": "CVE-2026-41218",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "description",
          "text": "Configuring BIG-IP PEM iRules with certain commands on a virtual server can cause the Traffic Management Microkernel (TMM) to terminate, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41218 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41218.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41218"
    },
    {
      "cve": "CVE-2026-41219",
      "cwe": {
        "id": "CWE-532",
        "name": "Insertion of Sensitive Information into Log File"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insertion of Sensitive Information into Log File",
          "title": "CWE-532"
        },
        {
          "category": "description",
          "text": "An improper sanitization vulnerability in the BIG-IP QKView utility allows low-privileged attackers to read sensitive information from QKView files, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41219 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41219.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41219"
    },
    {
      "cve": "CVE-2026-41225",
      "cwe": {
        "id": "CWE-648",
        "name": "Incorrect Use of Privileged APIs"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Use of Privileged APIs",
          "title": "CWE-648"
        },
        {
          "category": "description",
          "text": "A vulnerability in iControl REST allows a highly privileged, authenticated attacker with at least Manager role to create configuration objects that enable arbitrary command execution.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41225 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41225.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41225"
    },
    {
      "cve": "CVE-2026-41227",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "description",
          "text": "Certain undisclosed traffic on an HTTP/2 virtual server with Layer 7 DoS Protection can increase memory usage and cause the Traffic Management Microkernel (TMM) process to terminate.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41227 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41227.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41227"
    },
    {
      "cve": "CVE-2026-41953",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
          "title": "CWE-77"
        },
        {
          "category": "description",
          "text": "A vulnerability in BIG-IP systems enables a highly privileged, authenticated attacker with at least Resource Administrator role to modify configuration objects, resulting in privilege escalation.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41953 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41953.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41953"
    },
    {
      "cve": "CVE-2026-41954",
      "notes": [
        {
          "category": "description",
          "text": "A sensitive information disclosure vulnerability in an undisclosed iControl REST endpoint and TMOS Shell (tmsh) command may allow an authenticated attacker with resource administrator privileges to access sensitive information.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41954 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41954.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41954"
    },
    {
      "cve": "CVE-2026-41956",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "description",
          "text": "Configuring a classification profile on a UDP virtual server can cause the Traffic Management Microkernel (TMM) to terminate upon receiving certain undisclosed requests, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41956 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41956.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41956"
    },
    {
      "cve": "CVE-2026-41957",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "description",
          "text": "An authenticated remote code execution vulnerability exists in the BIG-IP and BIG-IQ Configuration utility through undisclosed vectors, excluding software versions that have reached End of Technical Support.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41957 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41957.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41957"
    },
    {
      "cve": "CVE-2026-41959",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        },
        {
          "category": "description",
          "text": "Incorrect permission assignment vulnerabilities in BIG-IP and BIG-IQ TMOS Shell (tmsh) network diagnostics commands and BIG-IP iControl REST may allow authenticated attackers to view network status of destination systems.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-41959 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41959.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-41959"
    },
    {
      "cve": "CVE-2026-42058",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        },
        {
          "category": "description",
          "text": "An authenticated attacker can exploit undisclosed requests to BIG-IP iControl REST to leak local user account names, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42058 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42058.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42058"
    },
    {
      "cve": "CVE-2026-42063",
      "cwe": {
        "id": "CWE-552",
        "name": "Files or Directories Accessible to External Parties"
      },
      "notes": [
        {
          "category": "other",
          "text": "Files or Directories Accessible to External Parties",
          "title": "CWE-552"
        },
        {
          "category": "description",
          "text": "A vulnerability in iControl SOAP allows authenticated users with Resource Administrator or Administrator roles to download sensitive files, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42063 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42063.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42063"
    },
    {
      "cve": "CVE-2026-42406",
      "cwe": {
        "id": "CWE-267",
        "name": "Privilege Defined With Unsafe Actions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Privilege Defined With Unsafe Actions",
          "title": "CWE-267"
        },
        {
          "category": "description",
          "text": "A vulnerability in BIG-IP and BIG-IQ systems allows a highly privileged, authenticated attacker with the Certificate Manager role to modify configuration objects and execute arbitrary commands, excluding versions past End of Technical Support.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42406 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42406.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42406"
    },
    {
      "cve": "CVE-2026-42408",
      "cwe": {
        "id": "CWE-312",
        "name": "Cleartext Storage of Sensitive Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Cleartext Storage of Sensitive Information",
          "title": "CWE-312"
        },
        {
          "category": "description",
          "text": "A vulnerability in an undisclosed TMOS Shell (tmsh) command in BIG-IP DNS may allow a highly privileged authenticated attacker to view sensitive information.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42408 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42408.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42408"
    },
    {
      "cve": "CVE-2026-42409",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "description",
          "text": "Configuring an HTTP/2 profile with an iRule using HTTP::redirect or HTTP::respond on a virtual server can cause the Traffic Management Microkernel (TMM) process to terminate due to certain request handling issues.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42409 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42409.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42409"
    },
    {
      "cve": "CVE-2026-42780",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "description",
          "text": "A directory traversal vulnerability in BIG-IP SSL Orchestrator allows an authenticated high-privilege attacker to overwrite, delete, or corrupt arbitrary local files, affecting supported software versions.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42780 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42780.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42780"
    },
    {
      "cve": "CVE-2026-42781",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        },
        {
          "category": "description",
          "text": "Configuring embedded Packet Velocity Acceleration (ePVA) can increase resource utilization in ePVA and Traffic Management Microkernel (TMM) due to undisclosed local ethernet traffic, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42781 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42781.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42781"
    },
    {
      "cve": "CVE-2026-42919",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "description",
          "text": "A vulnerability in BIG-IP systems allows an authenticated attacker with administrative access to escalate privileges and cross security boundaries, with unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42919 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42919.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42919"
    },
    {
      "cve": "CVE-2026-42920",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        },
        {
          "category": "description",
          "text": "Configuring a Client SSL profile with Allow Dynamic Record Sizing on a UDP virtual server can cause the Traffic Management Microkernel (TMM) to terminate due to undisclosed traffic issues.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42920 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42920.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42920"
    },
    {
      "cve": "CVE-2026-42924",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        },
        {
          "category": "description",
          "text": "An authenticated attacker with Resource Administrator or Administrator roles can exploit iControl SOAP to create SNMP configuration objects, leading to privilege escalation.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42924 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42924.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42924"
    },
    {
      "cve": "CVE-2026-42930",
      "cwe": {
        "id": "CWE-35",
        "name": "Path Traversal: \u0027.../...//\u0027"
      },
      "notes": [
        {
          "category": "other",
          "text": "Path Traversal: \u0027.../...//\u0027",
          "title": "CWE-35"
        },
        {
          "category": "description",
          "text": "An authenticated attacker with Administrator privileges may bypass Appliance mode restrictions on a BIG-IP system, including some unsupported software versions not evaluated.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42930 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42930.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42930"
    },
    {
      "cve": "CVE-2026-42937",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        },
        {
          "category": "description",
          "text": "Incorrect permission assignment vulnerabilities in BIG-IP and BIG-IQ TMOS Shell arp and ndp commands, as well as in BIG-IP iControl REST, may allow an authenticated attacker to access adjacent network information.",
          "title": "Summary"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3",
          "CSAFPID-4",
          "CSAFPID-5",
          "CSAFPID-6",
          "CSAFPID-7",
          "CSAFPID-8",
          "CSAFPID-9",
          "CSAFPID-10",
          "CSAFPID-11",
          "CSAFPID-12",
          "CSAFPID-13",
          "CSAFPID-14",
          "CSAFPID-15",
          "CSAFPID-16",
          "CSAFPID-17",
          "CSAFPID-18",
          "CSAFPID-19",
          "CSAFPID-20",
          "CSAFPID-21",
          "CSAFPID-22",
          "CSAFPID-23",
          "CSAFPID-24",
          "CSAFPID-25",
          "CSAFPID-26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42937 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42937.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-4",
            "CSAFPID-5",
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-8",
            "CSAFPID-9",
            "CSAFPID-10",
            "CSAFPID-11",
            "CSAFPID-12",
            "CSAFPID-13",
            "CSAFPID-14",
            "CSAFPID-15",
            "CSAFPID-16",
            "CSAFPID-17",
            "CSAFPID-18",
            "CSAFPID-19",
            "CSAFPID-20",
            "CSAFPID-21",
            "CSAFPID-22",
            "CSAFPID-23",
            "CSAFPID-24",
            "CSAFPID-25",
            "CSAFPID-26"
          ]
        }
      ],
      "title": "CVE-2026-42937"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…