Product:

Big\-Ip_global_traffic_manager

(F5)
Repositories https://github.com/torvalds/linux
#Vulnerabilities 388
Date Id Summary Products Score Patch Annotated
2019-10-03 CVE-2018-14880 The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr(). Mac_os_x, Debian_linux, Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Big\-Iq_centralized_management, Enterprise_manager, Iworkflow, Traffix_signaling_delivery_controller, Fedora, Leap, Enterprise_linux, Tcpdump 7.5
2019-10-09 CVE-2018-5743 By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6,... Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Big\-Iq_centralized_management, Enterprise_manager, Iworkflow, Bind 7.5
2019-10-09 CVE-2019-6471 A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Big\-Iq_centralized_management, Enterprise_manager, Iworkflow, Bind 5.9
2019-11-14 CVE-2018-12207 Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. Ubuntu_linux, Debian_linux, Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Iq_centralized_management, Enterprise_manager, Fedora, Celeron_g1610_firmware, Celeron_g1610t_firmware, Celeron_g1620_firmware, Celeron_g1620t_firmware, Celeron_g1630_firmware, Celeron_g1820_firmware, Celeron_g1820t_firmware, Celeron_g1820te_firmware, Celeron_g1830_firmware, Celeron_g1840_firmware, Celeron_g1840t_firmware, Celeron_g1850_firmware, Celeron_g3900_firmware, Celeron_g3900e_firmware, Celeron_g3900t_firmware, Celeron_g3900te_firmware, Celeron_g3902e_firmware, Celeron_g3920_firmware, Celeron_g3930_firmware, Celeron_g3930e_firmware, Celeron_g3930t_firmware, Celeron_g3930te_firmware, Celeron_g3950_firmware, Celeron_g4900_firmware, Celeron_g4900t_firmware, Celeron_g4920_firmware, Celeron_g4930_firmware, Celeron_g4930e_firmware, Celeron_g4930t_firmware, Celeron_g4932e_firmware, Celeron_g4950_firmware, Core_i3\-1005g1_firmware, Core_i3\-10110u_firmware, Core_i3\-10110y_firmware, Core_i3\-5005u_firmware, Core_i3\-5010u_firmware, Core_i3\-5015u_firmware, Core_i3\-5020u_firmware, Core_i3\-5157u_firmware, Core_i3\-6100_firmware, Core_i3\-6100h_firmware, Core_i3\-6100u_firmware, Core_i3\-6167u_firmware, Core_i3\-7100_firmware, Core_i3\-7100h_firmware, Core_i3\-7100t_firmware, Core_i3\-7100u_firmware, Core_i3\-7167u_firmware, Core_i3\-7300_firmware, Core_i3\-7300t_firmware, Core_i3\-7320_firmware, Core_i3\-7350k_firmware, Core_i3\-8100_firmware, Core_i3\-8100t_firmware, Core_i3\-8109u_firmware, Core_i3\-8130u_firmware, Core_i3\-8145u_firmware, Core_i3\-8300_firmware, Core_i3\-8300t_firmware, Core_i3\-8350k_firmware, Core_i3\-9100_firmware, Core_i3\-9100t_firmware, Core_i3\-9300_firmware, Core_i3\-9300t_firmware, Core_i3\-9320_firmware, Core_i3\-9350k_firmware, Core_i5\+8400_firmware, Core_i5\+8500_firmware, Core_i5\-10210u_firmware, Core_i5\-10210y_firmware, Core_i5\-10310y_firmware, Core_i5\-1035g1_firmware, Core_i5\-1035g4_firmware, Core_i5\-1035g7_firmware, Core_i5\-5200u_firmware, Core_i5\-5250u_firmware, Core_i5\-5257u_firmware, Core_i5\-5287u_firmware, Core_i5\-5350h_firmware, Core_i5\-6200u_firmware, Core_i5\-6260u_firmware, Core_i5\-6267u_firmware, Core_i5\-6287u_firmware, Core_i5\-6300hq_firmware, Core_i5\-6350hq_firmware, Core_i5\-7200u_firmware, Core_i5\-7260u_firmware, Core_i5\-7267u_firmware, Core_i5\-7287u_firmware, Core_i5\-7300hq_firmware, Core_i5\-7360u_firmware, Core_i5\-7400_firmware, Core_i5\-7400t_firmware, Core_i5\-7440hq_firmware, Core_i5\-7500_firmware, Core_i5\-7500t_firmware, Core_i5\-7600_firmware, Core_i5\-7600k_firmware, Core_i5\-7600t_firmware, Core_i5\-7y54_firmware, Core_i5\-8200y_firmware, Core_i5\-8250u_firmware, Core_i5\-8259u_firmware, Core_i5\-8265u_firmware, Core_i5\-8269u_firmware, Core_i5\-8300h_firmware, Core_i5\-8305g_firmware, Core_i5\-8350u_firmware, Core_i5\-8400_firmware, Core_i5\-8400b_firmware, Core_i5\-8400t_firmware, Core_i5\-8500b_firmware, Core_i5\-8700b_firmware, Core_i5\-9300h_firmware, Core_i5\-9400_firmware, Core_i5\-9400h_firmware, Core_i5\-9400t_firmware, Core_i5\-9500_firmware, Core_i5\-9500t_firmware, Core_i5\-9600_firmware, Core_i5\-9600k_firmware, Core_i5\-9600t_firmware, Core_i7\+8700_firmware, Core_i7\-10510u_firmware, Core_i7\-10510y_firmware, Core_i7\-1065g7_firmware, Core_i7\-10710u_firmware, Core_i7\-5500u_firmware, Core_i7\-5550u_firmware, Core_i7\-5557u_firmware, Core_i7\-5700hq_firmware, Core_i7\-5750hq_firmware, Core_i7\-5775c_firmware, Core_i7\-5850hq_firmware, Core_i7\-5950hq_firmware, Core_i7\-6500u_firmware, Core_i7\-6560u_firmware, Core_i7\-6567u_firmware, Core_i7\-6700hq_firmware, Core_i7\-6770hq_firmware, Core_i7\-6820hk_firmware, Core_i7\-6870hq_firmware, Core_i7\-6970hq_firmware, Core_i7\-7500u_firmware, Core_i7\-7560u_firmware, Core_i7\-7567u_firmware, Core_i7\-7660u_firmware, Core_i7\-7700_firmware, Core_i7\-7700hq_firmware, Core_i7\-7700k_firmware, Core_i7\-7700t_firmware, Core_i7\-7800x_firmware, Core_i7\-7820hk_firmware, Core_i7\-7820hq_firmware, Core_i7\-7820x_firmware, Core_i7\-7920hq_firmware, Core_i7\-8086k_firmware, Core_i7\-8500y_firmware, Core_i7\-8550u_firmware, Core_i7\-8559u_firmware, Core_i7\-8565u_firmware, Core_i7\-8650u_firmware, Core_i7\-8705g_firmware, Core_i7\-8706g_firmware, Core_i7\-8709g_firmware, Core_i7\-8750h_firmware, Core_i7\-8809g_firmware, Core_i7\-9700_firmware, Core_i7\-9700k_firmware, Core_i7\-9700t_firmware, Core_i7\-9750h_firmware, Core_i7\-9850h_firmware, Core_i9\-10900x_x\-Series_firmware, Core_i9\-10920x_x\-Series_firmware, Core_i9\-10940x_x\-Series_firmware, Core_i9\-10980xe_firmware, Core_i9\-7900x_firmware, Core_i9\-7920x_firmware, Core_i9\-7940x_firmware, Core_i9\-7960x_firmware, Core_i9\-7980xe_firmware, Core_i9\-9900x_x\-Series_firmware, Core_i9\-9920x_x\-Series_firmware, Core_i9\-9940x_x\-Series_firmware, Core_i9\-9960x_x\-Series_firmware, Core_i9\-9980xe_firmware, Core_m3\-6y30_firmware, Core_m3\-6y54_firmware, Core_m3\-7y30_firmware, Core_m3\-8100y_firmware, Core_m\-5y10_firmware, Core_m\-5y10a_firmware, Core_m\-5y10c_firmware, Core_m\-5y31_firmware, Core_m\-5y51_firmware, Core_m\-5y70_firmware, Core_m\-5y71_firmware, Pentium_gold_4410y_firmware, Pentium_gold_4415u_firmware, Pentium_gold_4415y_firmware, Pentium_gold_4417u_firmware, Pentium_gold_4425y_firmware, Pentium_gold_5405u_firmware, Pentium_gold_6405u_firmware, Pentium_gold_g5400_firmware, Pentium_gold_g5400t_firmware, Pentium_gold_g5420_firmware, Pentium_gold_g5420t_firmware, Pentium_gold_g5500_firmware, Pentium_gold_g5500t_firmware, Pentium_gold_g5600_firmware, Pentium_gold_g5600t_firmware, Pentium_gold_g5620_firmware, Xeon_3040_firmware, Xeon_3050_firmware, Xeon_3060_firmware, Xeon_3065_firmware, Xeon_3070_firmware, Xeon_5030_firmware, Xeon_5040_firmware, Xeon_5050_firmware, Xeon_5060_firmware, Xeon_5063_firmware, Xeon_5070_firmware, Xeon_5080_firmware, Xeon_5110_firmware, Xeon_5120_firmware, Xeon_5130_firmware, Xeon_5140_firmware, Xeon_5150_firmware, Xeon_5160_firmware, Xeon_7020_firmware, Xeon_7030_firmware, Xeon_7040_firmware, Xeon_7041_firmware, Xeon_7110m_firmware, Xeon_7110n_firmware, Xeon_7120m_firmware, Xeon_7120n_firmware, Xeon_7130m_firmware, Xeon_7130n_firmware, Xeon_7140m_firmware, Xeon_7140n_firmware, Xeon_7150n_firmware, Xeon_bronze_3204_firmware, Xeon_d\-1513n_firmware, Xeon_d\-1518_firmware, Xeon_d\-1520_firmware, Xeon_d\-1521_firmware, Xeon_d\-1523n_firmware, Xeon_d\-1527_firmware, Xeon_d\-1528_firmware, Xeon_d\-1529_firmware, Xeon_d\-1531_firmware, Xeon_d\-1533n_firmware, Xeon_d\-1537_firmware, Xeon_d\-1539_firmware, Xeon_d\-1540_firmware, Xeon_d\-1541_firmware, Xeon_d\-1543n_firmware, Xeon_d\-1548_firmware, Xeon_d\-1553n_firmware, Xeon_d\-1557_firmware, Xeon_d\-1559_firmware, Xeon_d\-1567_firmware, Xeon_d\-1571_firmware, Xeon_d\-1577_firmware, Xeon_d\-1602_firmware, Xeon_d\-1622_firmware, Xeon_d\-1623n_firmware, Xeon_d\-1627_firmware, Xeon_d\-1633n_firmware, Xeon_d\-1637_firmware, Xeon_d\-1649n_firmware, Xeon_d\-1653n_firmware, Xeon_d\-2123it_firmware, Xeon_d\-2141i_firmware, Xeon_d\-2142it_firmware, Xeon_d\-2143it_firmware, Xeon_d\-2145nt_firmware, Xeon_d\-2146nt_firmware, Xeon_d\-2161i_firmware, Xeon_d\-2163it_firmware, Xeon_d\-2166nt_firmware, Xeon_d\-2173it_firmware, Xeon_d\-2177nt_firmware, Xeon_d\-2183it_firmware, Xeon_d\-2187nt_firmware, Xeon_d\-2191_firmware, Xeon_e3110_firmware, Xeon_e3120_firmware, Xeon_e3\-1220_v3_firmware, Xeon_e3\-1220_v5_firmware, Xeon_e3\-1220_v6_firmware, Xeon_e3\-1220l_v3_firmware, Xeon_e3\-1225_v3_firmware, Xeon_e3\-1225_v5_firmware, Xeon_e3\-1225_v6_firmware, Xeon_e3\-1226_v3_firmware, Xeon_e3\-1230_v5_firmware, Xeon_e3\-1230_v6_firmware, Xeon_e3\-1230l_v3_firmware, Xeon_e3\-1231_v3_firmware, Xeon_e3\-1235l_v5_firmware, Xeon_e3\-1240_v5_firmware, Xeon_e3\-1240_v6_firmware, Xeon_e3\-1240l_v3_firmware, Xeon_e3\-1240l_v5_firmware, Xeon_e3\-1241_v3_firmware, Xeon_e3\-1245_v5_firmware, Xeon_e3\-1245_v6_firmware, Xeon_e3\-1246_v3_firmware, Xeon_e3\-1260l_v5_firmware, Xeon_e3\-1265l_v3_firmware, Xeon_e3\-1265l_v4_firmware, Xeon_e3\-1268l_v5_firmware, Xeon_e3\-1270_v5_firmware, Xeon_e3\-1270_v6_firmware, Xeon_e3\-1271_v3_firmware, Xeon_e3\-1275_v3_firmware, Xeon_e3\-1275_v5_firmware, Xeon_e3\-1275_v6_firmware, Xeon_e3\-1276_v3_firmware, Xeon_e3\-1280_v5_firmware, Xeon_e3\-1280_v6_firmware, Xeon_e3\-1281_v3_firmware, Xeon_e3\-1285_v4_firmware, Xeon_e3\-1285l_v4_firmware, Xeon_e3\-1505m_v5_firmware, Xeon_e3\-1505m_v6_firmware, Xeon_e3\-1515m_v5_firmware, Xeon_e3\-1535m_v5_firmware, Xeon_e3\-1535m_v6_firmware, Xeon_e3\-1545m_v5_firmware, Xeon_e3\-1558l_v5_firmware, Xeon_e3\-1565l_v5_firmware, Xeon_e3\-1575m_v5_firmware, Xeon_e3\-1585_v5_firmware, Xeon_e3\-1585l_v5_firmware, Xeon_e5205_firmware, Xeon_e5220_firmware, Xeon_e5240_firmware, Xeon_e5310_firmware, Xeon_e5320_firmware, Xeon_e5335_firmware, Xeon_e5345_firmware, Xeon_e5405_firmware, Xeon_e5410_firmware, Xeon_e5420_firmware, Xeon_e5430_firmware, Xeon_e5440_firmware, Xeon_e5450_firmware, Xeon_e5462_firmware, Xeon_e5472_firmware, Xeon_e5502_firmware, Xeon_e5503_firmware, Xeon_e5504_firmware, Xeon_e5506_firmware, Xeon_e5507_firmware, Xeon_e5520_firmware, Xeon_e5530_firmware, Xeon_e5540_firmware, Xeon_e5603_firmware, Xeon_e5606_firmware, Xeon_e5607_firmware, Xeon_e5620_firmware, Xeon_e5630_firmware, Xeon_e5640_firmware, Xeon_e5645_firmware, Xeon_e5649_firmware, Xeon_e5\-1620_v2_firmware, Xeon_e5\-1620_v3_firmware, Xeon_e5\-1620_v4_firmware, Xeon_e5\-1630_v3_firmware, Xeon_e5\-1630_v4_firmware, Xeon_e5\-1650_v2_firmware, Xeon_e5\-1650_v3_firmware, Xeon_e5\-1650_v4_firmware, Xeon_e5\-1660_v2_firmware, Xeon_e5\-1660_v3_firmware, Xeon_e5\-1660_v4_firmware, Xeon_e5\-1680_v3_firmware, Xeon_e5\-1680_v4_firmware, Xeon_e5\-2403_v2_firmware, Xeon_e5\-2407_v2_firmware, Xeon_e5\-2420_v2_firmware, Xeon_e5\-2430_v2_firmware, Xeon_e5\-2430l_v2_firmware, Xeon_e5\-2440_v2_firmware, Xeon_e5\-2450_v2_firmware, Xeon_e5\-2450l_v2_firmware, Xeon_e5\-2470_v2_firmware, Xeon_e5\-2603_v2_firmware, Xeon_e5\-2603_v3_firmware, Xeon_e5\-2603_v4_firmware, Xeon_e5\-2608l_v4_firmware, Xeon_e5\-2609_v2_firmware, Xeon_e5\-2609_v4_firmware, Xeon_e5\-2618l_v4_firmware, Xeon_e5\-2620_v2_firmware, Xeon_e5\-2620_v3_firmware, Xeon_e5\-2620_v4_firmware, Xeon_e5\-2623_v3_firmware, Xeon_e5\-2623_v4_firmware, Xeon_e5\-2628l_v4_firmware, Xeon_e5\-2630_v2_firmware, Xeon_e5\-2630_v3_firmware, Xeon_e5\-2630_v4_firmware, Xeon_e5\-2630l_v2_firmware, Xeon_e5\-2630l_v3_firmware, Xeon_e5\-2630l_v4_firmware, Xeon_e5\-2637_v2_firmware, Xeon_e5\-2637_v3_firmware, Xeon_e5\-2637_v4_firmware, Xeon_e5\-2640_v2_firmware, Xeon_e5\-2640_v3_firmware, Xeon_e5\-2640_v4_firmware, Xeon_e5\-2643_v2_firmware, Xeon_e5\-2643_v3_firmware, Xeon_e5\-2643_v4_firmware, Xeon_e5\-2648l_v4_firmware, Xeon_e5\-2650_v2_firmware, Xeon_e5\-2650_v3_firmware, Xeon_e5\-2650_v4_firmware, Xeon_e5\-2650l_v2_firmware, Xeon_e5\-2650l_v3_firmware, Xeon_e5\-2650l_v4_firmware, Xeon_e5\-2658_v4_firmware, Xeon_e5\-2660_v2_firmware, Xeon_e5\-2660_v3_firmware, Xeon_e5\-2660_v4_firmware, Xeon_e5\-2667_v2_firmware, Xeon_e5\-2667_v3_firmware, Xeon_e5\-2667_v4_firmware, Xeon_e5\-2670_v2_firmware, Xeon_e5\-2670_v3_firmware, Xeon_e5\-2680_v2_firmware, Xeon_e5\-2680_v3_firmware, Xeon_e5\-2680_v4_firmware, Xeon_e5\-2683_v3_firmware, Xeon_e5\-2683_v4_firmware, Xeon_e5\-2687w_v2_firmware, Xeon_e5\-2687w_v3_firmware, Xeon_e5\-2687w_v4_firmware, Xeon_e5\-2690_v2_firmware, Xeon_e5\-2690_v3_firmware, Xeon_e5\-2690_v4_firmware, Xeon_e5\-2695_v2_firmware, Xeon_e5\-2695_v3_firmware, Xeon_e5\-2695_v4_firmware, Xeon_e5\-2697_v2_firmware, Xeon_e5\-2697_v3_firmware, Xeon_e5\-2697_v4_firmware, Xeon_e5\-2697a_v4_firmware, Xeon_e5\-2698_v3_firmware, Xeon_e5\-2698_v4_firmware, Xeon_e5\-2699_v3_firmware, Xeon_e5\-2699_v4_firmware, Xeon_e5\-2699a_v4_firmware, Xeon_e5\-4603_v2_firmware, Xeon_e5\-4607_v2_firmware, Xeon_e5\-4610_v2_firmware, Xeon_e5\-4610_v3_firmware, Xeon_e5\-4610a_v4_firmware, Xeon_e5\-4620_v2_firmware, Xeon_e5\-4620_v3_firmware, Xeon_e5\-4620_v4_firmware, Xeon_e5\-4627_v2_firmware, Xeon_e5\-4627_v3_firmware, Xeon_e5\-4627_v4_firmware, Xeon_e5\-4628l_v4_firmware, Xeon_e5\-4640_v2_firmware, Xeon_e5\-4640_v3_firmware, Xeon_e5\-4640_v4_firmware, Xeon_e5\-4650_v2_firmware, Xeon_e5\-4650_v3_firmware, Xeon_e5\-4650_v4_firmware, Xeon_e5\-4655_v3_firmware, Xeon_e5\-4655_v4_firmware, Xeon_e5\-4657l_v2_firmware, Xeon_e5\-4660_v3_firmware, Xeon_e5\-4660_v4_firmware, Xeon_e5\-4667_v3_firmware, Xeon_e5\-4667_v4_firmware, Xeon_e5\-4669_v3_firmware, Xeon_e5\-4669_v4_firmware, Xeon_e6510_firmware, Xeon_e6540_firmware, Xeon_e7210_firmware, Xeon_e7220_firmware, Xeon_e7310_firmware, Xeon_e7320_firmware, Xeon_e7330_firmware, Xeon_e7340_firmware, Xeon_e7420_firmware, Xeon_e7430_firmware, Xeon_e7440_firmware, Xeon_e7450_firmware, Xeon_e7520_firmware, Xeon_e7530_firmware, Xeon_e7540_firmware, Xeon_e7\-2850_v2_firmware, Xeon_e7\-2870_v2_firmware, Xeon_e7\-2880_v2_firmware, Xeon_e7\-2890_v2_firmware, Xeon_e7\-4809_v2_firmware, Xeon_e7\-4809_v3_firmware, Xeon_e7\-4809_v4_firmware, Xeon_e7\-4820_v2_firmware, Xeon_e7\-4820_v3_firmware, Xeon_e7\-4820_v4_firmware, Xeon_e7\-4830_v2_firmware, Xeon_e7\-4830_v3_firmware, Xeon_e7\-4830_v4_firmware, Xeon_e7\-4850_v2_firmware, Xeon_e7\-4850_v3_firmware, Xeon_e7\-4850_v4_firmware, Xeon_e7\-4860_v2_firmware, Xeon_e7\-4870_v2_firmware, Xeon_e7\-4880_v2_firmware, Xeon_e7\-4890_v2_firmware, Xeon_e7\-8850_v2_firmware, Xeon_e7\-8855_v4_firmware, Xeon_e7\-8857_v2_firmware, Xeon_e7\-8860_v3_firmware, Xeon_e7\-8860_v4_firmware, Xeon_e7\-8867_v3_firmware, Xeon_e7\-8867_v4_firmware, Xeon_e7\-8870_v2_firmware, Xeon_e7\-8870_v3_firmware, Xeon_e7\-8870_v4_firmware, Xeon_e7\-8880_v2_firmware, Xeon_e7\-8880_v3_firmware, Xeon_e7\-8880_v4_firmware, Xeon_e7\-8880l_v2_firmware, Xeon_e7\-8880l_v3_firmware, Xeon_e7\-8890_v2_firmware, Xeon_e7\-8890_v3_firmware, Xeon_e7\-8890_v4_firmware, Xeon_e7\-8891_v2_firmware, Xeon_e7\-8891_v3_firmware, Xeon_e7\-8891_v4_firmware, Xeon_e7\-8893_v2_firmware, Xeon_e7\-8893_v3_firmware, Xeon_e7\-8893_v4_firmware, Xeon_e7\-8895_v2_firmware, Xeon_e\-2104g_firmware, Xeon_e\-2124_firmware, Xeon_e\-2124g_firmware, Xeon_e\-2126g_firmware, Xeon_e\-2134_firmware, Xeon_e\-2136_firmware, Xeon_e\-2144g_firmware, Xeon_e\-2146g_firmware, Xeon_e\-2174g_firmware, Xeon_e\-2176g_firmware, Xeon_e\-2186g_firmware, Xeon_e\-2224_firmware, Xeon_e\-2224g_firmware, Xeon_e\-2226g_firmware, Xeon_e\-2234_firmware, Xeon_e\-2236_firmware, Xeon_e\-2244g_firmware, Xeon_e\-2246g_firmware, Xeon_e\-2274g_firmware, Xeon_e\-2276g_firmware, Xeon_e\-2278g_firmware, Xeon_e\-2286g_firmware, Xeon_e\-2288g_firmware, Xeon_ec3539_firmware, Xeon_ec5509_firmware, Xeon_ec5539_firmware, Xeon_ec5549_firmware, Xeon_gold_5215_firmware, Xeon_gold_5215l_firmware, Xeon_gold_5215m_firmware, Xeon_gold_5217_firmware, Xeon_gold_5218_firmware, Xeon_gold_5218b_firmware, Xeon_gold_5218n_firmware, Xeon_gold_5218t_firmware, Xeon_gold_5220_firmware, Xeon_gold_5220s_firmware, Xeon_gold_5220t_firmware, Xeon_gold_5222_firmware, Xeon_gold_6222v_firmware, Xeon_gold_6226_firmware, Xeon_gold_6230_firmware, Xeon_gold_6230n_firmware, Xeon_gold_6230t_firmware, Xeon_gold_6234_firmware, Xeon_gold_6238_firmware, Xeon_gold_6238l_firmware, Xeon_gold_6238m_firmware, Xeon_gold_6238t_firmware, Xeon_gold_6240_firmware, Xeon_gold_6240l_firmware, Xeon_gold_6240m_firmware, Xeon_gold_6240y_firmware, Xeon_gold_6242_firmware, Xeon_gold_6244_firmware, Xeon_gold_6246_firmware, Xeon_gold_6248_firmware, Xeon_gold_6252_firmware, Xeon_gold_6252n_firmware, Xeon_gold_6254_firmware, Xeon_gold_6262v_firmware, Xeon_l3014_firmware, Xeon_l3110_firmware, Xeon_l3360_firmware, Xeon_l3406_firmware, Xeon_l3426_firmware, Xeon_l5215_firmware, Xeon_l5238_firmware, Xeon_l5240_firmware, Xeon_l5310_firmware, Xeon_l5318_firmware, Xeon_l5320_firmware, Xeon_l5335_firmware, Xeon_l5408_firmware, Xeon_l5410_firmware, Xeon_l5420_firmware, Xeon_l5430_firmware, Xeon_l5506_firmware, Xeon_l5508_firmware, Xeon_l5518_firmware, Xeon_l5520_firmware, Xeon_l5530_firmware, Xeon_l5609_firmware, Xeon_l5618_firmware, Xeon_l5630_firmware, Xeon_l5638_firmware, Xeon_l5640_firmware, Xeon_l7345_firmware, Xeon_l7445_firmware, Xeon_l7455_firmware, Xeon_l7545_firmware, Xeon_l7555_firmware, Xeon_lc3518_firmware, Xeon_lc3528_firmware, Xeon_lc5518_firmware, Xeon_lc5528_firmware, Xeon_lv_5113_firmware, Xeon_lv_5128_firmware, Xeon_lv_5133_firmware, Xeon_lv_5138_firmware, Xeon_lv_5148_firmware, Xeon_platinum_8253_firmware, Xeon_platinum_8256_firmware, Xeon_platinum_8260_firmware, Xeon_platinum_8260l_firmware, Xeon_platinum_8260m_firmware, Xeon_platinum_8260y_firmware, Xeon_platinum_8268_firmware, Xeon_platinum_8270_firmware, Xeon_platinum_8276_firmware, Xeon_platinum_8276l_firmware, Xeon_platinum_8276m_firmware, Xeon_platinum_8280_firmware, Xeon_platinum_8280l_firmware, Xeon_platinum_8280m_firmware, Xeon_platinum_9221_firmware, Xeon_platinum_9222_firmware, Xeon_platinum_9242_firmware, Xeon_platinum_9282_firmware, Xeon_silver_4208_firmware, Xeon_silver_4209t_firmware, Xeon_silver_4210_firmware, Xeon_silver_4214_firmware, Xeon_silver_4214y_firmware, Xeon_silver_4215_firmware, Xeon_silver_4216_firmware, Xeon_w3520_firmware, Xeon_w3530_firmware, Xeon_w3540_firmware, Xeon_w3550_firmware, Xeon_w3565_firmware, Xeon_w3570_firmware, Xeon_w3580_firmware, Xeon_w3670_firmware, Xeon_w3680_firmware, Xeon_w3690_firmware, Xeon_w5580_firmware, Xeon_w5590_firmware, Xeon_w\-2123_firmware, Xeon_w\-2125_firmware, Xeon_w\-2133_firmware, Xeon_w\-2135_firmware, Xeon_w\-2145_firmware, Xeon_w\-2155_firmware, Xeon_w\-2175_firmware, Xeon_w\-2195_firmware, Xeon_w\-2223_firmware, Xeon_w\-2225_firmware, Xeon_w\-2235_firmware, Xeon_w\-2245_firmware, Xeon_w\-2255_firmware, Xeon_w\-2265_firmware, Xeon_w\-2275_firmware, Xeon_w\-2295_firmware, Xeon_w\-3175x_firmware, Xeon_w\-3223_firmware, Xeon_w\-3225_firmware, Xeon_w\-3245_firmware, Xeon_w\-3245m_firmware, Xeon_w\-3265_firmware, Xeon_w\-3265m_firmware, Xeon_w\-3275_firmware, Xeon_w\-3275m_firmware, Xeon_x3210_firmware, Xeon_x3220_firmware, Xeon_x3230_firmware, Xeon_x3320_firmware, Xeon_x3330_firmware, Xeon_x3350_firmware, Xeon_x3360_firmware, Xeon_x3370_firmware, Xeon_x3380_firmware, Xeon_x3430_firmware, Xeon_x3440_firmware, Xeon_x3450_firmware, Xeon_x3460_firmware, Xeon_x3470_firmware, Xeon_x3480_firmware, Xeon_x5260_firmware, Xeon_x5270_firmware, Xeon_x5272_firmware, Xeon_x5355_firmware, Xeon_x5365_firmware, Xeon_x5450_firmware, Xeon_x5460_firmware, Xeon_x5470_firmware, Xeon_x5472_firmware, Xeon_x5482_firmware, Xeon_x5492_firmware, Xeon_x5550_firmware, Xeon_x5560_firmware, Xeon_x5570_firmware, Xeon_x5647_firmware, Xeon_x5650_firmware, Xeon_x5660_firmware, Xeon_x5667_firmware, Xeon_x5670_firmware, Xeon_x5672_firmware, Xeon_x5675_firmware, Xeon_x5677_firmware, Xeon_x5680_firmware, Xeon_x5687_firmware, Xeon_x5690_firmware, Xeon_x6550_firmware, Xeon_x7350_firmware, Xeon_x7460_firmware, Xeon_x7542_firmware, Xeon_x7550_firmware, Xeon_x7560_firmware, Leap, Solaris, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Openshift_container_platform 6.5
2019-11-26 CVE-2019-6675 BIG-IP configurations using Active Directory, LDAP, or Client Certificate LDAP for management authentication with multiple servers are exposed to a vulnerability which allows an authentication bypass. This can result in a complete compromise of the system. This issue only impacts specific engineering hotfixes using the aforementioned authentication configuration. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from... Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager 9.8
2019-12-18 CVE-2019-11109 Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access. Big\-Ip_10000s_firmware, Big\-Ip_10050s_firmware, Big\-Ip_10150v\-N_firmware, Big\-Ip_10200v\-S_firmware, Big\-Ip_10250v_firmware, Big\-Ip_10350v\-N_firmware, Big\-Ip_12250v_firmware, Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_b2250_firmware, Big\-Ip_b4300_firmware, Big\-Ip_b4340n_firmware, Big\-Ip_b4450n_firmware, Big\-Ip_domain_name_system, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_i10600_firmware, Big\-Ip_i10800_firmware, Big\-Ip_i11600_firmware, Big\-Ip_i11800_firmware, Big\-Ip_i15600_firmware, Big\-Ip_i15800_firmware, Big\-Ip_i5600_firmware, Big\-Ip_i5800_firmware, Big\-Ip_i7600_firmware, Big\-Ip_i7800_firmware, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Viprion_2200_firmware, Server_platform_services_firmware 4.4
2020-01-08 CVE-2014-5209 An Information Disclosure vulnerability exists in NTP 4.2.7p25 private (mode 6/7) messages via a GET_RESTRICT control message, which could let a malicious user obtain sensitive information. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_protocol_security_module, Big\-Ip_wan_optimization_manager, Big\-Ip_webaccelerator, Big\-Iq_adc, Big\-Iq_centralized_management, Big\-Iq_cloud, Big\-Iq_cloud_and_orchestration, Big\-Iq_device, Big\-Iq_security, Enterprise_manager, Iworkflow, Mobilesafe, Websafe, Ntp 5.3
2022-08-04 CVE-2022-32455 In BIG-IP Versions 16.1.x before 16.1.2.2, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when a BIG-IP LTM Client SSL profile is configured on a virtual server to perform client certificate authentication with session tickets enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager 7.5
2022-12-07 CVE-2022-41622 In all versions,  BIG-IP and BIG-IQ are vulnerable to cross-site request forgery (CSRF) attacks through iControl SOAP.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Iq_centralized_management 8.8
2022-12-07 CVE-2022-41800 In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager 8.7