F5 Big-Ip Application Security Manager vulnerabilities

540 known vulnerabilities affecting f5/big-ip_application_security_manager.

Total CVEs
540
CISA KEV
11
actively exploited
Public exploits
23
Exploited in wild
11
Severity breakdown
CRITICAL43HIGH310MEDIUM180LOW7

Vulnerabilities

Page 19 of 27
CVE-2019-6623HIGHCVSS 7.5≥ 12.1.0, ≤ 12.1.4≥ 13.0.0, ≤ 13.1.1.4+2 more2019-07-02
CVE-2019-6623 [HIGH] CVE-2019-6623: On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, undisclosed traffic On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, undisclosed traffic sent to BIG-IP iSession virtual server may cause the Traffic Management Microkernel (TMM) to restart, resulting in a Denial-of-Service (DoS).
nvd
CVE-2019-6622HIGHCVSS 7.2≥ 11.5.1, ≤ 11.6.4≥ 12.1.0, ≤ 12.1.4+2 more2019-07-02
CVE-2019-6622 [HIGH] CWE-77 CVE-2019-6622: On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.5, 13.0.0-13.1.1.4, 12.1.0-12.1.4.1, and 11.5.1-11.6.4, an On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.5, 13.0.0-13.1.1.4, 12.1.0-12.1.4.1, and 11.5.1-11.6.4, an undisclosed iControl REST worker is vulnerable to command injection by an administrator or resource administrator user. This attack is only exploitable on multi-bladed systems.
nvd
CVE-2019-6621HIGHCVSS 7.2≥ 11.5.2, < 11.5.9≥ 11.6.1, < 11.6.4+4 more2019-07-02
CVE-2019-6621 [HIGH] CWE-78 CVE-2019-6621: On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4.1, 11.6.1-11.6.3.4, and 1 On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4.1, 11.6.1-11.6.3.4, and 11.5.2-11.5.8 and BIG-IQ 7.0.0-7.1.0.2, 6.0.0-6.1.0, and 5.1.0-5.4.0, an undisclosed iControl REST worker is vulnerable to command injection by an admin/resource admin user. This issue impacts both iControl REST and tmsh implementations.
nvd
CVE-2019-6642HIGHCVSS 8.8≥ 11.5.2, ≤ 11.6.4≥ 12.1.0, ≤ 12.1.4.2+3 more2019-07-01
CVE-2019-6642 [HIGH] CVE-2019-6642: In BIG-IP 15.0.0, 14.0.0-14.1.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.2, and 11.5.2-11.6.4, BIG-IQ 6.0.0 In BIG-IP 15.0.0, 14.0.0-14.1.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.2, and 11.5.2-11.6.4, BIG-IQ 6.0.0-6.1.0 and 5.1.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1, authenticated users with the ability to upload files (via scp, for example) can escalate their privileges to allow root shell access from within the TMOS Shell (tmsh) interface. The tmsh inter
nvd
CVE-2019-11478HIGHCVSS 7.5≥ 11.5.2, ≤ 11.6.4≥ 12.1.0, ≤ 12.1.4+3 more2019-06-19
CVE-2019-11478 [HIGH] CWE-770 CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the L Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11
nvd
CVE-2019-11479HIGHCVSS 7.5≥ 11.5.2, < 11.6.5.1≥ 12.1.0, < 12.1.5.1+4 more2019-06-19
CVE-2019-11479 [HIGH] CWE-405 CVE-2019-11479: Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, a
nvd
CVE-2019-11477HIGHCVSS 7.5≥ 11.5.2, ≤ 11.6.4≥ 12.1.0, ≤ 12.1.4+3 more2019-06-19
CVE-2019-11477 [HIGH] CWE-190 CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer ov Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in com
nvd
CVE-2019-12295HIGHCVSS 7.5≥ 12.1.3.6, < 12.1.5.3≥ 13.1.1.2, < 13.1.3.5+3 more2019-05-23
CVE-2019-12295 [HIGH] CWE-674 CVE-2019-12295: In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. This was addressed in epan/packet.c by restricting the number of layers and consequently limiting recursion.
nvd
CVE-2019-6619HIGHCVSS 7.5≥ 12.1.0, < 12.1.4.1≥ 13.0.0, < 13.1.1.5+1 more2019-05-03
CVE-2019-6619 [HIGH] CVE-2019-6619: On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, the Traffic Management Microkernel (T On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, the Traffic Management Microkernel (TMM) may restart when a virtual server has an HTTP/2 profile with Application Layer Protocol Negotiation (ALPN) enabled and it processes traffic where the ALPN extension size is zero.
nvd
CVE-2019-6612HIGHCVSS 7.5≥ 11.5.2, < 11.5.9≥ 11.6.1, < 11.6.4+3 more2019-05-03
CVE-2019-6612 [HIGH] CVE-2019-6612: On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, DNS q On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, DNS query TCP connections that are aborted before receiving a response from a DNS cache may cause TMM to restart.
nvd
CVE-2019-6616HIGHCVSS 7.2≥ 11.5.2, < 11.5.9≥ 11.6.1, < 11.6.4+3 more2019-05-03
CVE-2019-6616 [HIGH] CVE-2019-6616: On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, admin On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, administrative users with TMSH access can overwrite critical system files on BIG-IP which can result in bypass of whitelist / blacklist restrictions enforced by appliance mode.
nvd
CVE-2019-6611HIGHCVSS 7.5≥ 11.5.2, < 11.5.9≥ 11.6.1, < 11.6.4+3 more2019-05-03
CVE-2019-6611 [HIGH] CVE-2019-6611: When BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8 are When BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8 are processing certain rare data sequences occurring in PPTP VPN traffic, the BIG-IP system may execute incorrect logic. The TMM may restart and produce a core file as a result of this condition. The BIG-IP system provisioned with the CGNAT module and configured with
nvd
CVE-2019-6617MEDIUMCVSS 6.5≥ 11.5.2, < 11.5.9≥ 11.6.1, < 11.6.4+3 more2019-05-03
CVE-2019-6617 [MEDIUM] CWE-269 CVE-2019-6617: On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, a use On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, a user with the Resource Administrator role is able to overwrite sensitive low-level files (such as /etc/passwd) using SFTP to modify user permissions, without Advanced Shell access. This is contrary to our definition for the Resource Administrator (RA) role
nvd
CVE-2019-6615MEDIUMCVSS 4.9≥ 11.5.2, < 11.5.9≥ 11.6.1, < 11.6.4+3 more2019-05-03
CVE-2019-6615 [MEDIUM] CVE-2019-6615: On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, Admin On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, Administrator and Resource Administrator roles might exploit TMSH access to bypass Appliance Mode restrictions on BIG-IP systems.
nvd
CVE-2019-6614MEDIUMCVSS 6.5≥ 12.1.0, < 12.1.4.1≥ 13.0.0, < 13.1.1.5+1 more2019-05-03
CVE-2019-6614 [MEDIUM] CVE-2019-6614: On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, internal methods used to prevent arbi On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, internal methods used to prevent arbitrary file overwrites in Appliance Mode were not fully effective. An authenticated attacker with a high privilege level may be able to bypass protections implemented in appliance mode to overwrite arbitrary system files.
nvd
CVE-2019-6613MEDIUMCVSS 5.3≥ 11.5.2, < 11.5.9≥ 11.6.1, < 11.6.4+2 more2019-05-03
CVE-2019-6613 [MEDIUM] CWE-319 CVE-2019-6613: On BIG-IP 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, SNMP may expose sensit On BIG-IP 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, SNMP may expose sensitive configuration objects over insecure transmission channels. This issue is exposed when a passphrase is used with various profile types and is accessed using SNMPv2.
nvd
CVE-2019-6618MEDIUMCVSS 4.9≥ 11.5.2, ≤ 11.5.8≥ 11.6.1, ≤ 11.6.3.4+3 more2019-05-03
CVE-2019-6618 [MEDIUM] CVE-2019-6618: On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, users On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8, users with the Resource Administrator role can modify sensitive portions of the filesystem if provided Advanced Shell Access, such as editing /etc/passwd. This allows modifications to user objects and is contrary to our definition for the Resource Administrator (RA)
nvd
CVE-2019-6609CRITICALCVSS 9.8≥ 12.1.2, < 12.1.4.1≥ 13.0.0, < 13.1.1.4+2 more2019-04-15
CVE-2019-6609 [CRITICAL] CWE-522 CVE-2019-6609: Platform dependent weakness. This issue only impacts iSeries platforms. On these platforms, in BIG-I Platform dependent weakness. This issue only impacts iSeries platforms. On these platforms, in BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) versions 14.0.0-14.1.0.1, 13.0.0-13.1.1.3, and 12.1.1 HF2-12.1.4, the secureKeyCapable attribute was not set which causes secure vault to not use
nvd
CVE-2019-6603HIGHCVSS 7.5≥ 11.5.1, ≤ 11.5.8≥ 11.6.1, ≤ 11.6.3+2 more2019-03-28
CVE-2019-6603 [HIGH] CVE-2019-6603: In BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3, and 13.0.0-13.0.1, malformed TCP packets sent In BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3, and 13.0.0-13.0.1, malformed TCP packets sent to a self IP address or a FastL4 virtual server may cause an interruption of service. The control plane is not exposed to this issue. This issue impacts the data plane virtual servers and self IPs.
nvd
CVE-2019-6602HIGHCVSS 7.5≥ 11.5.1, ≤ 11.5.8≥ 11.6.1, ≤ 11.6.32019-03-28
CVE-2019-6602 [HIGH] CWE-203 CVE-2019-6602: In BIG-IP 11.5.1-11.5.8 and 11.6.1-11.6.3, the Configuration Utility login page may not follow best In BIG-IP 11.5.1-11.5.8 and 11.6.1-11.6.3, the Configuration Utility login page may not follow best security practices when handling a malicious request.
nvd