F5 Big-Ip Fraud Protection Service vulnerabilities

366 known vulnerabilities affecting f5/big-ip_fraud_protection_service.

Total CVEs
366
CISA KEV
6
actively exploited
Public exploits
9
Exploited in wild
6
Severity breakdown
CRITICAL25HIGH217MEDIUM121LOW3

Vulnerabilities

Page 15 of 19
CVE-2019-6662MEDIUMCVSS 6.5≥ 13.1.0, < 13.1.1.52019-11-15
CVE-2019-6662 [MEDIUM] CWE-532 CVE-2019-6662: On BIG-IP 13.1.0-13.1.1.4, sensitive information is logged into the local log files and/or remote lo On BIG-IP 13.1.0-13.1.1.4, sensitive information is logged into the local log files and/or remote logging targets when restjavad processes an invalid request. Users with access to the log files would be able to view that data.
nvd
CVE-2018-12207MEDIUMCVSS 6.5≥ 11.5.2, ≤ 11.6.5≥ 12.1.0, ≤ 12.1.5+3 more2019-11-14
CVE-2018-12207 [MEDIUM] CWE-20 CVE-2018-12207: Improper invalidation for page table updates by a virtual guest operating system for multiple Intel( Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
nvd
CVE-2019-6657MEDIUMCVSS 6.1≥ 11.5.2, ≤ 11.6.5≥ 12.1.0, ≤ 12.1.5+1 more2019-11-01
CVE-2019-6657 [MEDIUM] CWE-79 CVE-2019-6657: On BIG-IP 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, a reflected cross-site scripting (XSS On BIG-IP 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, a reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Traffic Management User Interface (TMUI), also known as the BIG-IP Configuration utility.
nvd
CVE-2018-5743HIGHCVSS 7.5≥ 11.5.2, ≤ 11.6.5≥ 12.1.0, ≤ 12.1.4+3 more2019-10-09
CVE-2018-5743 [HIGH] CWE-770 CVE-2018-5743: By design, BIND is intended to limit the number of TCP clients that can be connected at any given ti By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be e
nvd
CVE-2019-6471MEDIUMCVSS 5.9≥ 11.5.2, ≤ 11.5.9≥ 11.6.1, ≤ 11.6.4+5 more2019-10-09
CVE-2019-6471 [MEDIUM] CWE-362 CVE-2019-6471: A race condition which may occur when discarding malformed packets can result in BIND exiting due to A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported
nvd
CVE-2018-14880HIGHCVSS 7.5≥ 11.5.2, ≤ 11.6.5≥ 12.1.0, ≤ 12.1.5+3 more2019-10-03
CVE-2018-14880 [HIGH] CWE-125 CVE-2018-14880: The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr( The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().
nvd
CVE-2018-14468HIGHCVSS 7.5≥ 11.6.0, ≤ 11.6.5≥ 12.1.0, ≤ 12.1.5+3 more2019-10-03
CVE-2018-14468 [HIGH] CWE-125 CVE-2018-14468: The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print(). The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().
nvd
CVE-2019-6651MEDIUMCVSS 5.3≥ 11.5.1, ≤ 11.6.4≥ 12.1.0, ≤ 12.1.4.1+4 more2019-09-25
CVE-2019-6651 [MEDIUM] CWE-203 CVE-2019-6651: In BIG-IP 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.5.1-11.6.4, In BIG-IP 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.5.1-11.6.4, BIG-IQ 7.0.0, 6.0.0-6.1.0,5.2.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1, the Configuration utility login page may not follow best security practices when handling a malicious request.
nvd
CVE-2019-6654MEDIUMCVSS 4.3≥ 11.5.1, ≤ 11.6.5≥ 12.1.0, ≤ 12.1.5+2 more2019-09-25
CVE-2019-6654 [MEDIUM] CWE-20 CVE-2019-6654: On versions 14.0.0-14.1.2, 13.0.0-13.1.3, 12.1.0-12.1.5, and 11.5.1-11.6.5, the BIG-IP system fails On versions 14.0.0-14.1.2, 13.0.0-13.1.3, 12.1.0-12.1.5, and 11.5.1-11.6.5, the BIG-IP system fails to perform Martian Address Filtering (As defined in RFC 1812 section 5.3.7) on the control plane (management interface). This may allow attackers on an adjacent system to force BIG-IP into processing packets with spoofed source addresses.
nvd
CVE-2019-6649CRITICALCVSS 9.1≥ 11.5.2, ≤ 11.5.9≥ 11.6.1, ≤ 11.6.4+5 more2019-09-20
CVE-2019-6649 [CRITICAL] CVE-2019-6649: F5 BIG-IP 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.6.0-11.6.4, F5 BIG-IP 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.6.0-11.6.4, and 11.5.1-11.5.9 and Enterprise Manager 3.1.1 may expose sensitive information and allow the system configuration to be modified when using non-default ConfigSync settings.
nvd
CVE-2019-6644CRITICALCVSS 9.4≥ 12.1.3, ≤ 12.1.4≥ 13.0.0, ≤ 13.1.2+2 more2019-09-04
CVE-2019-6644 [CRITICAL] CVE-2019-6644: Similar to the issue identified in CVE-2018-12120, on versions 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13. Similar to the issue identified in CVE-2018-12120, on versions 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.2, and 12.1.0-12.1.4 BIG-IP will bind a debug nodejs process to all interfaces when invoked. This may expose the process to unauthorized users if the plugin is left in debug mode and the port is accessible.
nvd
CVE-2019-6643HIGHCVSS 7.5≥ 11.5.2, ≤ 11.6.4≥ 12.1.0, ≤ 12.1.4+3 more2019-09-04
CVE-2019-6643 [HIGH] CVE-2019-6643: On versions 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.2, 12.1.0-12.1.4.1, and 11.5.2-11.6.4, an On versions 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.2, 12.1.0-12.1.4.1, and 11.5.2-11.6.4, an attacker sending specifically crafted DHCPv6 requests through a BIG-IP virtual server configured with a DHCPv6 profile may be able to cause the TMM process to produce a core file.
nvd
CVE-2019-6646HIGHCVSS 8.8≥ 11.5.2, ≤ 11.6.4v12.0.02019-09-04
CVE-2019-6646 [HIGH] CVE-2019-6646: On BIG-IP 11.5.2-11.6.4 and Enterprise Manager 3.1.1, REST users with guest privileges may be able t On BIG-IP 11.5.2-11.6.4 and Enterprise Manager 3.1.1, REST users with guest privileges may be able to escalate their privileges and run commands with admin privileges.
nvd
CVE-2019-6645HIGHCVSS 7.5≥ 11.5.2, ≤ 11.6.4≥ 12.1.0, ≤ 12.1.4+3 more2019-09-04
CVE-2019-6645 [HIGH] CVE-2019-6645: On BIG-IP 14.0.0-14.1.0.5, 13.0.0-13.1.2, 12.1.0-12.1.4.1, 11.5.2-11.6.4, FTP traffic passing throug On BIG-IP 14.0.0-14.1.0.5, 13.0.0-13.1.2, 12.1.0-12.1.4.1, 11.5.2-11.6.4, FTP traffic passing through a Virtual Server with both an active FTP profile associated and connection mirroring configured may lead to a TMM crash causing the configured HA action to be taken.
nvd
CVE-2019-6647MEDIUMCVSS 5.3≥ 11.5.1, ≤ 11.6.4≥ 12.1.0, ≤ 12.1.4+3 more2019-09-04
CVE-2019-6647 [MEDIUM] CWE-401 CVE-2019-6647: On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.2, 12.1.0-12.1.4.1, 11.5.2-11.6.4, when proc On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.2, 12.1.0-12.1.4.1, 11.5.2-11.6.4, when processing authentication attempts for control-plane users MCPD leaks a small amount of memory. Under rare conditions attackers with access to the management interface could eventually deplete memory on the system.
nvd
CVE-2019-10744CRITICALCVSS 9.1≥ 12.1.0, < 12.1.5.2≥ 13.1.0, < 13.1.3.4+3 more2019-07-26
CVE-2019-10744 [CRITICAL] CWE-1321 CVE-2019-10744: Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDe Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
nvd
CVE-2019-6641MEDIUMCVSS 6.5≥ 12.1.2, ≤ 12.1.42019-07-03
CVE-2019-6641 [MEDIUM] CVE-2019-6641: On BIG-IP 12.1.0-12.1.4.1, undisclosed requests can cause iControl REST processes to crash. The atta On BIG-IP 12.1.0-12.1.4.1, undisclosed requests can cause iControl REST processes to crash. The attack can only come from an authenticated user; all roles are capable of performing the attack. Unauthenticated users cannot perform this attack.
nvd
CVE-2019-6634MEDIUMCVSS 6.5≥ 12.1.0, < 12.1.4.1≥ 13.0.0, < 13.1.1.5+2 more2019-07-03
CVE-2019-6634 [MEDIUM] CVE-2019-6634: On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, a high volume of mal On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, a high volume of malformed analytics report requests leads to instability in restjavad process. This causes issues with both iControl REST and some portions of TMUI. The attack requires an authenticated user with any role.
nvd
CVE-2019-6632MEDIUMCVSS 5.5≥ 12.1.0, < 12.1.4.1≥ 13.0.0, < 13.1.1.5+2 more2019-07-03
CVE-2019-6632 [MEDIUM] CWE-330 CVE-2019-6632: On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, under certain circum On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, under certain circumstances, attackers can decrypt configuration items that are encrypted because the vCMP configuration unit key is generated with insufficient randomness. The attack prerequisite is direct access to encrypted configuration and/or UCS files.
nvd
CVE-2019-6635MEDIUMCVSS 4.4≥ 11.5.2, < 11.5.9≥ 11.6.1, < 11.6.4+4 more2019-07-03
CVE-2019-6635 [MEDIUM] CVE-2019-6635: On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11. On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.1-11.5.8, when the BIG-IP system is licensed for Appliance mode, a user with either the Administrator or the Resource Administrator role can bypass Appliance mode restrictions.
nvd