F5 BIG-IP Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Networks OS
Multiple vulnerabilities were identified in F5 BIG-IP, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, spoofing, remote code execution, data manipulation, cross-site scripting and bypass security restriction on the targeted system.
Impact
- Cross-Site Scripting
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
- Spoofing
- Data Manipulation
System / Technologies affected
BIG-IP (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO)
- version 11.6.1 - 11.6.5
- version 12.1.0 - 12.1.5
- version 13.1.0 - 13.1.3
- version 14.1.0 - 14.1.3
- version 15.1.0 - 15.1.2
- version 16.0.0 - 16.0.1
Enterprise Manager
- version 3.1.1
BIG-IQ Centralized Management
- version 5.0.0 - 5.4.0
- version 6.0.0 - 6.1.0
- version 7.0.0 - 7.1.0
F5 iWorkflow
- version 2.3.0
Traffix SDC
- version 4.4.0
- version 5.0.0 - 5.1.0
Solutions
Before installation of the software, please visit the software vendor web-site for more details.
- https://support.f5.com/csp/article/K38481791
- https://support.f5.com/csp/article/K42531048
- https://support.f5.com/csp/article/K24551552
- https://support.f5.com/csp/article/K21350967
- https://support.f5.com/csp/article/K38481791
- https://support.f5.com/csp/article/K11315080
- https://support.f5.com/csp/article/K64119434
- https://support.f5.com/csp/article/K57542514
- https://support.f5.com/csp/article/K90011301
- https://support.f5.com/csp/article/K02453220
- https://support.f5.com/csp/article/K66544153
Vulnerability Identifier
- CVE-2018-20685
- CVE-2019-3856
- CVE-2019-3857
- CVE-2019-3863
- CVE-2009-5155
- CVE-2019-6110
- CVE-2019-6111
- CVE-2019-9636
- CVE-2019-17563
- CVE-2020-10029
- CVE-2020-11022
- CVE-2020-11023
Source
Related Link
- https://support.f5.com/csp/article/K38481791
- https://support.f5.com/csp/article/K42531048
- https://support.f5.com/csp/article/K24551552
- https://support.f5.com/csp/article/K21350967
- https://support.f5.com/csp/article/K38481791
- https://support.f5.com/csp/article/K11315080
- https://support.f5.com/csp/article/K64119434
- https://support.f5.com/csp/article/K57542514
- https://support.f5.com/csp/article/K90011301
- https://support.f5.com/csp/article/K02453220
- https://support.f5.com/csp/article/K66544153
- https://www.auscert.org.au/bulletins/ESB-2020.3038.2/
- https://www.auscert.org.au/bulletins/ESB-2019.0346.3/
- https://www.auscert.org.au/bulletins/ESB-2020.0294.2/
- https://www.auscert.org.au/bulletins/ESB-2020.1411.2/
- https://www.auscert.org.au/bulletins/ESB-2020.3038.2/
- https://www.auscert.org.au/bulletins/ESB-2020.1410.2/
- https://www.auscert.org.au/bulletins/ESB-2019.0994.3/
- https://www.auscert.org.au/bulletins/ESB-2020.3176.2/
- https://www.auscert.org.au/bulletins/ESB-2020.3214.2/
- https://www.auscert.org.au/bulletins/ESB-2020.2660.3/
Related Tags
Share with