Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-29480 (GCVE-0-2022-29480)
Vulnerability from cvelistv5 – Published: 2022-05-05 16:47 – Updated: 2024-09-17 04:29- CWE-400 - Uncontrolled Resource Consumption
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| F5 | BIG-IP |
Affected:
12.1.x
Affected: 11.6.x Unaffected: 14.0.0 , < 14.0.x* (custom) Affected: 13.1.x , < 13.1.5 (custom) Unaffected: 14.1.0 , < 14.1.x* (custom) Unaffected: 15.1.0 , < 15.1.x* (custom) Unaffected: 16.1.0 , < 16.1.x* (custom) Unaffected: 17.0.0 , < 17.0.x* (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:26:06.277Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K71103363"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "BIG-IP",
"vendor": "F5",
"versions": [
{
"status": "affected",
"version": "12.1.x"
},
{
"status": "affected",
"version": "11.6.x"
},
{
"lessThan": "14.0.x*",
"status": "unaffected",
"version": "14.0.0",
"versionType": "custom"
},
{
"lessThan": "13.1.5",
"status": "affected",
"version": "13.1.x",
"versionType": "custom"
},
{
"lessThan": "14.1.x*",
"status": "unaffected",
"version": "14.1.0",
"versionType": "custom"
},
{
"lessThan": "15.1.x*",
"status": "unaffected",
"version": "15.1.0",
"versionType": "custom"
},
{
"lessThan": "16.1.x*",
"status": "unaffected",
"version": "16.1.0",
"versionType": "custom"
},
{
"lessThan": "17.0.x*",
"status": "unaffected",
"version": "17.0.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-05-04T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-05T16:47:53.000Z",
"orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
"shortName": "f5"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.f5.com/csp/article/K71103363"
}
],
"source": {
"discovery": "INTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-05-04T14:00:00.000Z",
"ID": "CVE-2022-29480",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BIG-IP",
"version": {
"version_data": [
{
"version_affected": "!\u003e=",
"version_name": "14.0.x",
"version_value": "14.0.0"
},
{
"version_affected": "\u003c",
"version_name": "13.1.x",
"version_value": "13.1.5"
},
{
"version_affected": "=",
"version_name": "12.1.x",
"version_value": "12.1.x"
},
{
"version_affected": "=",
"version_name": "11.6.x",
"version_value": "11.6.x"
},
{
"version_affected": "!\u003e=",
"version_name": "14.1.x",
"version_value": "14.1.0"
},
{
"version_affected": "!\u003e=",
"version_name": "15.1.x",
"version_value": "15.1.0"
},
{
"version_affected": "!\u003e=",
"version_name": "16.1.x",
"version_value": "16.1.0"
},
{
"version_affected": "!\u003e=",
"version_name": "17.0.x",
"version_value": "17.0.0"
}
]
}
}
]
},
"vendor_name": "F5"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400 Uncontrolled Resource Consumption"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.f5.com/csp/article/K71103363",
"refsource": "MISC",
"url": "https://support.f5.com/csp/article/K71103363"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
"assignerShortName": "f5",
"cveId": "CVE-2022-29480",
"datePublished": "2022-05-05T16:47:53.227Z",
"dateReserved": "2022-04-19T00:00:00.000Z",
"dateUpdated": "2024-09-17T04:29:06.587Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTFR-2022-AVI-419
Vulnerability from certfr_avis - Published: 2022-05-05 - Updated: 2022-05-05
De multiples vulnérabilités ont été découvertes dans les produits F5. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- F5 BIG-IP (tous modules) versions 17.x antérieures à 17.0.0
- F5 BIG-IP (tous modules) versions 16.x antérieures à 16.1.2.2
- F5 BIG-IP (tous modules) versions 15.x antérieures à 15.1.5.1
- F5 BIG-IP (tous modules) versions antérieures à 14.1.4.6
- NGINX App Protect versions antérieures à 3.7.0
Concernant la vulnérabilité critique, immatriculée CVE-2022-1388, l'éditeur propose un correctif de sécurité pour les produits F5 BIG-IP en versions 13.x. Cependant il est très fortement recommandé pour toutes les versions 11.x, 12.x et 13.x de migrer au moins vers la version 14.1.4.6 afin de pouvoir bénéficier de l'intégralité des correctifs de sécurité.
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eF5 BIG-IP (tous modules) versions 17.x ant\u00e9rieures \u00e0 17.0.0\u003c/li\u003e \u003cli\u003eF5 BIG-IP (tous modules) versions 16.x ant\u00e9rieures \u00e0 16.1.2.2\u003c/li\u003e \u003cli\u003eF5 BIG-IP (tous modules) versions 15.x ant\u00e9rieures \u00e0 15.1.5.1\u003c/li\u003e \u003cli\u003eF5 BIG-IP (tous modules) versions ant\u00e9rieures \u00e0 14.1.4.6\u003c/li\u003e \u003cli\u003eNGINX App Protect versions ant\u00e9rieures \u00e0 3.7.0\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eConcernant la vuln\u00e9rabilit\u00e9 critique, immatricul\u00e9e CVE-2022-1388, l\u0027\u00e9diteur propose un correctif de s\u00e9curit\u00e9 pour les produits F5 BIG-IP en versions 13.x. Cependant il est tr\u00e8s fortement recommand\u00e9 pour toutes les versions 11.x, 12.x et 13.x de migrer au moins vers la version 14.1.4.6 afin de pouvoir b\u00e9n\u00e9ficier de l\u0027int\u00e9gralit\u00e9 des correctifs de s\u00e9curit\u00e9.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-25946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25946"
},
{
"name": "CVE-2022-28695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28695"
},
{
"name": "CVE-2022-27662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27662"
},
{
"name": "CVE-2022-26415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26415"
},
{
"name": "CVE-2022-26890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26890"
},
{
"name": "CVE-2022-29480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29480"
},
{
"name": "CVE-2022-27636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27636"
},
{
"name": "CVE-2022-27230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27230"
},
{
"name": "CVE-2022-29474",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29474"
},
{
"name": "CVE-2022-27495",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27495"
},
{
"name": "CVE-2022-27634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27634"
},
{
"name": "CVE-2022-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1389"
},
{
"name": "CVE-2022-26340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26340"
},
{
"name": "CVE-2022-26370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26370"
},
{
"name": "CVE-2022-26517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26517"
},
{
"name": "CVE-2022-28708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28708"
},
{
"name": "CVE-2022-28706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28706"
},
{
"name": "CVE-2022-29263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29263"
},
{
"name": "CVE-2022-29473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29473"
},
{
"name": "CVE-2022-28714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28714"
},
{
"name": "CVE-2022-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29491"
},
{
"name": "CVE-2022-27806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27806"
},
{
"name": "CVE-2022-28716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28716"
},
{
"name": "CVE-2022-27181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27181"
},
{
"name": "CVE-2022-28859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28859"
},
{
"name": "CVE-2022-26835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26835"
},
{
"name": "CVE-2022-28691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28691"
},
{
"name": "CVE-2022-29479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29479"
},
{
"name": "CVE-2022-27880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27880"
},
{
"name": "CVE-2022-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1388"
},
{
"name": "CVE-2022-27182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27182"
},
{
"name": "CVE-2022-26071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26071"
},
{
"name": "CVE-2022-27659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27659"
}
],
"initial_release_date": "2022-05-05T00:00:00",
"last_revision_date": "2022-05-05T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-419",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-05-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits F5.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F5",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K54082580 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K54082580"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K41440465 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K41440465"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K21317311 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K21317311"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K31856317 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K31856317"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K14229426 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K14229426"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K23454411 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K23454411"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K71103363 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K71103363"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K06323049 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K06323049"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K49905324 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K49905324"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K39002226 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K39002226"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K93543114 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K93543114"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K25451853 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K25451853"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K24248011 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K24248011"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K54460845 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K54460845"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K51539421 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K51539421"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K92306170 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K92306170"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K37155600 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K37155600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K64124988 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K64124988"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K17341495 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K17341495"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K38271531 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K38271531"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K41877405 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K41877405"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K80945213 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K80945213"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K08510472 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K08510472"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K03442392 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K03442392"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K85054496 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K85054496"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K68816502 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K68816502"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K23605346 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K23605346"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K59904248 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K59904248"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K68647001 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K68647001"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K74302282 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K74302282"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K85021277 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K85021277"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K47662005 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K47662005"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K94093538 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K94093538"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K57110035 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K57110035"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K57555833 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K57555833"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K92807525 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K92807525"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K53197140 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K53197140"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K81952114 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K81952114"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K53593534 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K53593534"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K52322100 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K52322100"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K03755971 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K03755971"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K70134152 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K70134152"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K33552735 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K33552735"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K67397230 du 04 mai 2022",
"url": "https://support.f5.com/csp/article/K67397230"
}
]
}
CNVD-2022-74967
Vulnerability from cnvd - Published: 2022-11-08厂商已发布了漏洞修复程序,请及时关注更新: https://support.f5.com/csp/article/K71103363
| Name | ['F5 BIG-IP (all modules) >=12.1.0,<=12.1.6', 'F5 BIG-IP (all modules) >=13.1.0,<=13.1.4', 'F5 BIG-IP (all modules) >=11.6.1,<=11.6.5'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-29480",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-29480"
}
},
"description": "F5 BIG-IP\u662fF5\u516c\u53f8\u7684\u4e00\u6b3e\u96c6\u6210\u4e86\u7f51\u7edc\u6d41\u91cf\u7f16\u6392\u3001\u8d1f\u8f7d\u5747\u8861\u3001\u667a\u80fdDNS\uff0c\u8fdc\u7a0b\u63a5\u5165\u7b56\u7565\u7ba1\u7406\u7b49\u529f\u80fd\u7684\u5e94\u7528\u4ea4\u4ed8\u5e73\u53f0\u3002\n\nF5 BIG-IP\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u670d\u52a1\u964d\u7ea7\uff0c\u4ece\u800c\u5bfc\u81f4BIG-IP\u7cfb\u7edf\u4e0a\u7684\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.f5.com/csp/article/K71103363",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-74967",
"openTime": "2022-11-08",
"patchDescription": "F5 BIG-IP\u662fF5\u516c\u53f8\u7684\u4e00\u6b3e\u96c6\u6210\u4e86\u7f51\u7edc\u6d41\u91cf\u7f16\u6392\u3001\u8d1f\u8f7d\u5747\u8861\u3001\u667a\u80fdDNS\uff0c\u8fdc\u7a0b\u63a5\u5165\u7b56\u7565\u7ba1\u7406\u7b49\u529f\u80fd\u7684\u5e94\u7528\u4ea4\u4ed8\u5e73\u53f0\u3002\r\n\r\nF5 BIG-IP\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u670d\u52a1\u964d\u7ea7\uff0c\u4ece\u800c\u5bfc\u81f4BIG-IP\u7cfb\u7edf\u4e0a\u7684\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "F5 BIG-IP\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2022-74967\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"F5 BIG-IP (all modules) \u003e=12.1.0\uff0c\u003c=12.1.6",
"F5 BIG-IP (all modules) \u003e=13.1.0\uff0c\u003c=13.1.4",
"F5 BIG-IP (all modules) \u003e=11.6.1\uff0c\u003c=11.6.5"
]
},
"referenceLink": "https://support.f5.com/csp/article/K71103363",
"serverity": "\u4e2d",
"submitTime": "2022-05-07",
"title": "F5 BIG-IP\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2022-74967\uff09"
}
FKIE_CVE-2022-29480
Vulnerability from fkie_nvd - Published: 2022-05-05 17:15 - Updated: 2024-11-21 06:595.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
| URL | Tags | ||
|---|---|---|---|
| f5sirt@f5.com | https://support.f5.com/csp/article/K71103363 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K71103363 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| f5 | big-ip_access_policy_manager | 11.6.1 | |
| f5 | big-ip_access_policy_manager | 11.6.2 | |
| f5 | big-ip_access_policy_manager | 11.6.3 | |
| f5 | big-ip_access_policy_manager | 11.6.4 | |
| f5 | big-ip_access_policy_manager | 11.6.5 | |
| f5 | big-ip_access_policy_manager | 12.1.0 | |
| f5 | big-ip_access_policy_manager | 12.1.1 | |
| f5 | big-ip_access_policy_manager | 12.1.2 | |
| f5 | big-ip_access_policy_manager | 12.1.3 | |
| f5 | big-ip_access_policy_manager | 12.1.4 | |
| f5 | big-ip_access_policy_manager | 12.1.5 | |
| f5 | big-ip_access_policy_manager | 12.1.6 | |
| f5 | big-ip_access_policy_manager | 13.1.0 | |
| f5 | big-ip_access_policy_manager | 13.1.1 | |
| f5 | big-ip_access_policy_manager | 13.1.3 | |
| f5 | big-ip_access_policy_manager | 13.1.4 | |
| f5 | big-ip_access_policy_manager | 13.1.5 | |
| f5 | big-ip_access_policy_manager | 14.1.0 | |
| f5 | big-ip_access_policy_manager | 14.1.2 | |
| f5 | big-ip_access_policy_manager | 14.1.3 | |
| f5 | big-ip_access_policy_manager | 14.1.4 | |
| f5 | big-ip_access_policy_manager | 15.1.0 | |
| f5 | big-ip_access_policy_manager | 15.1.1 | |
| f5 | big-ip_access_policy_manager | 15.1.2 | |
| f5 | big-ip_access_policy_manager | 15.1.3 | |
| f5 | big-ip_access_policy_manager | 15.1.4 | |
| f5 | big-ip_access_policy_manager | 15.1.5 | |
| f5 | big-ip_access_policy_manager | 16.1.0 | |
| f5 | big-ip_access_policy_manager | 16.1.1 | |
| f5 | big-ip_access_policy_manager | 16.1.2 | |
| f5 | big-ip_access_policy_manager | 17.0.0 | |
| f5 | big-ip_advanced_firewall_manager | 11.6.1 | |
| f5 | big-ip_advanced_firewall_manager | 11.6.2 | |
| f5 | big-ip_advanced_firewall_manager | 11.6.3 | |
| f5 | big-ip_advanced_firewall_manager | 11.6.4 | |
| f5 | big-ip_advanced_firewall_manager | 11.6.5 | |
| f5 | big-ip_advanced_firewall_manager | 12.1.0 | |
| f5 | big-ip_advanced_firewall_manager | 12.1.1 | |
| f5 | big-ip_advanced_firewall_manager | 12.1.2 | |
| f5 | big-ip_advanced_firewall_manager | 12.1.3 | |
| f5 | big-ip_advanced_firewall_manager | 12.1.4 | |
| f5 | big-ip_advanced_firewall_manager | 12.1.5 | |
| f5 | big-ip_advanced_firewall_manager | 12.1.6 | |
| f5 | big-ip_advanced_firewall_manager | 13.1.0 | |
| f5 | big-ip_advanced_firewall_manager | 13.1.1 | |
| f5 | big-ip_advanced_firewall_manager | 13.1.3 | |
| f5 | big-ip_advanced_firewall_manager | 13.1.4 | |
| f5 | big-ip_advanced_firewall_manager | 13.1.5 | |
| f5 | big-ip_advanced_firewall_manager | 14.1.0 | |
| f5 | big-ip_advanced_firewall_manager | 14.1.2 | |
| f5 | big-ip_advanced_firewall_manager | 14.1.3 | |
| f5 | big-ip_advanced_firewall_manager | 14.1.4 | |
| f5 | big-ip_advanced_firewall_manager | 15.1.0 | |
| f5 | big-ip_advanced_firewall_manager | 15.1.1 | |
| f5 | big-ip_advanced_firewall_manager | 15.1.2 | |
| f5 | big-ip_advanced_firewall_manager | 15.1.3 | |
| f5 | big-ip_advanced_firewall_manager | 15.1.4 | |
| f5 | big-ip_advanced_firewall_manager | 15.1.5 | |
| f5 | big-ip_advanced_firewall_manager | 16.1.0 | |
| f5 | big-ip_advanced_firewall_manager | 16.1.1 | |
| f5 | big-ip_advanced_firewall_manager | 16.1.2 | |
| f5 | big-ip_advanced_firewall_manager | 17.0.0 | |
| f5 | big-ip_analytics | 11.6.1 | |
| f5 | big-ip_analytics | 11.6.2 | |
| f5 | big-ip_analytics | 11.6.3 | |
| f5 | big-ip_analytics | 11.6.4 | |
| f5 | big-ip_analytics | 11.6.5 | |
| f5 | big-ip_analytics | 12.1.0 | |
| f5 | big-ip_analytics | 12.1.1 | |
| f5 | big-ip_analytics | 12.1.2 | |
| f5 | big-ip_analytics | 12.1.3 | |
| f5 | big-ip_analytics | 12.1.4 | |
| f5 | big-ip_analytics | 12.1.5 | |
| f5 | big-ip_analytics | 12.1.6 | |
| f5 | big-ip_analytics | 13.1.0 | |
| f5 | big-ip_analytics | 13.1.1 | |
| f5 | big-ip_analytics | 13.1.3 | |
| f5 | big-ip_analytics | 13.1.4 | |
| f5 | big-ip_analytics | 13.1.5 | |
| f5 | big-ip_analytics | 14.1.0 | |
| f5 | big-ip_analytics | 14.1.2 | |
| f5 | big-ip_analytics | 14.1.3 | |
| f5 | big-ip_analytics | 14.1.4 | |
| f5 | big-ip_analytics | 15.1.0 | |
| f5 | big-ip_analytics | 15.1.1 | |
| f5 | big-ip_analytics | 15.1.2 | |
| f5 | big-ip_analytics | 15.1.3 | |
| f5 | big-ip_analytics | 15.1.4 | |
| f5 | big-ip_analytics | 15.1.5 | |
| f5 | big-ip_analytics | 16.1.0 | |
| f5 | big-ip_analytics | 16.1.1 | |
| f5 | big-ip_analytics | 16.1.2 | |
| f5 | big-ip_analytics | 17.0.0 | |
| f5 | big-ip_application_acceleration_manager | 11.6.1 | |
| f5 | big-ip_application_acceleration_manager | 11.6.2 | |
| f5 | big-ip_application_acceleration_manager | 11.6.3 | |
| f5 | big-ip_application_acceleration_manager | 11.6.4 | |
| f5 | big-ip_application_acceleration_manager | 11.6.5 | |
| f5 | big-ip_application_acceleration_manager | 12.1.0 | |
| f5 | big-ip_application_acceleration_manager | 12.1.1 | |
| f5 | big-ip_application_acceleration_manager | 12.1.2 | |
| f5 | big-ip_application_acceleration_manager | 12.1.3 | |
| f5 | big-ip_application_acceleration_manager | 12.1.4 | |
| f5 | big-ip_application_acceleration_manager | 12.1.5 | |
| f5 | big-ip_application_acceleration_manager | 12.1.6 | |
| f5 | big-ip_application_acceleration_manager | 13.1.0 | |
| f5 | big-ip_application_acceleration_manager | 13.1.1 | |
| f5 | big-ip_application_acceleration_manager | 13.1.3 | |
| f5 | big-ip_application_acceleration_manager | 13.1.4 | |
| f5 | big-ip_application_acceleration_manager | 13.1.5 | |
| f5 | big-ip_application_acceleration_manager | 14.1.0 | |
| f5 | big-ip_application_acceleration_manager | 14.1.2 | |
| f5 | big-ip_application_acceleration_manager | 14.1.3 | |
| f5 | big-ip_application_acceleration_manager | 14.1.4 | |
| f5 | big-ip_application_acceleration_manager | 15.1.0 | |
| f5 | big-ip_application_acceleration_manager | 15.1.1 | |
| f5 | big-ip_application_acceleration_manager | 15.1.2 | |
| f5 | big-ip_application_acceleration_manager | 15.1.3 | |
| f5 | big-ip_application_acceleration_manager | 15.1.4 | |
| f5 | big-ip_application_acceleration_manager | 15.1.5 | |
| f5 | big-ip_application_acceleration_manager | 16.1.0 | |
| f5 | big-ip_application_acceleration_manager | 16.1.1 | |
| f5 | big-ip_application_acceleration_manager | 16.1.2 | |
| f5 | big-ip_application_acceleration_manager | 17.0.0 | |
| f5 | big-ip_application_security_manager | 11.6.1 | |
| f5 | big-ip_application_security_manager | 11.6.2 | |
| f5 | big-ip_application_security_manager | 11.6.3 | |
| f5 | big-ip_application_security_manager | 11.6.4 | |
| f5 | big-ip_application_security_manager | 11.6.5 | |
| f5 | big-ip_application_security_manager | 12.1.0 | |
| f5 | big-ip_application_security_manager | 12.1.1 | |
| f5 | big-ip_application_security_manager | 12.1.2 | |
| f5 | big-ip_application_security_manager | 12.1.3 | |
| f5 | big-ip_application_security_manager | 12.1.4 | |
| f5 | big-ip_application_security_manager | 12.1.5 | |
| f5 | big-ip_application_security_manager | 12.1.6 | |
| f5 | big-ip_application_security_manager | 13.1.0 | |
| f5 | big-ip_application_security_manager | 13.1.1 | |
| f5 | big-ip_application_security_manager | 13.1.3 | |
| f5 | big-ip_application_security_manager | 13.1.4 | |
| f5 | big-ip_application_security_manager | 13.1.5 | |
| f5 | big-ip_application_security_manager | 14.1.0 | |
| f5 | big-ip_application_security_manager | 14.1.2 | |
| f5 | big-ip_application_security_manager | 14.1.3 | |
| f5 | big-ip_application_security_manager | 14.1.4 | |
| f5 | big-ip_application_security_manager | 15.1.0 | |
| f5 | big-ip_application_security_manager | 15.1.1 | |
| f5 | big-ip_application_security_manager | 15.1.2 | |
| f5 | big-ip_application_security_manager | 15.1.3 | |
| f5 | big-ip_application_security_manager | 15.1.4 | |
| f5 | big-ip_application_security_manager | 15.1.5 | |
| f5 | big-ip_application_security_manager | 16.1.0 | |
| f5 | big-ip_application_security_manager | 16.1.1 | |
| f5 | big-ip_application_security_manager | 16.1.2 | |
| f5 | big-ip_application_security_manager | 17.0.0 | |
| f5 | big-ip_domain_name_system | 11.6.1 | |
| f5 | big-ip_domain_name_system | 11.6.2 | |
| f5 | big-ip_domain_name_system | 11.6.3 | |
| f5 | big-ip_domain_name_system | 11.6.4 | |
| f5 | big-ip_domain_name_system | 11.6.5 | |
| f5 | big-ip_domain_name_system | 12.1.0 | |
| f5 | big-ip_domain_name_system | 12.1.1 | |
| f5 | big-ip_domain_name_system | 12.1.2 | |
| f5 | big-ip_domain_name_system | 12.1.3 | |
| f5 | big-ip_domain_name_system | 12.1.4 | |
| f5 | big-ip_domain_name_system | 12.1.5 | |
| f5 | big-ip_domain_name_system | 12.1.6 | |
| f5 | big-ip_domain_name_system | 13.1.0 | |
| f5 | big-ip_domain_name_system | 13.1.1 | |
| f5 | big-ip_domain_name_system | 13.1.3 | |
| f5 | big-ip_domain_name_system | 13.1.4 | |
| f5 | big-ip_domain_name_system | 13.1.5 | |
| f5 | big-ip_domain_name_system | 14.1.0 | |
| f5 | big-ip_domain_name_system | 14.1.2 | |
| f5 | big-ip_domain_name_system | 14.1.3 | |
| f5 | big-ip_domain_name_system | 14.1.4 | |
| f5 | big-ip_domain_name_system | 15.1.0 | |
| f5 | big-ip_domain_name_system | 15.1.1 | |
| f5 | big-ip_domain_name_system | 15.1.2 | |
| f5 | big-ip_domain_name_system | 15.1.3 | |
| f5 | big-ip_domain_name_system | 15.1.4 | |
| f5 | big-ip_domain_name_system | 15.1.5 | |
| f5 | big-ip_domain_name_system | 16.1.0 | |
| f5 | big-ip_domain_name_system | 16.1.1 | |
| f5 | big-ip_domain_name_system | 16.1.2 | |
| f5 | big-ip_domain_name_system | 17.0.0 | |
| f5 | big-ip_fraud_protection_service | 11.6.1 | |
| f5 | big-ip_fraud_protection_service | 11.6.2 | |
| f5 | big-ip_fraud_protection_service | 11.6.3 | |
| f5 | big-ip_fraud_protection_service | 11.6.4 | |
| f5 | big-ip_fraud_protection_service | 11.6.5 | |
| f5 | big-ip_fraud_protection_service | 12.1.0 | |
| f5 | big-ip_fraud_protection_service | 12.1.1 | |
| f5 | big-ip_fraud_protection_service | 12.1.2 | |
| f5 | big-ip_fraud_protection_service | 12.1.3 | |
| f5 | big-ip_fraud_protection_service | 12.1.4 | |
| f5 | big-ip_fraud_protection_service | 12.1.5 | |
| f5 | big-ip_fraud_protection_service | 12.1.6 | |
| f5 | big-ip_fraud_protection_service | 13.1.0 | |
| f5 | big-ip_fraud_protection_service | 13.1.1 | |
| f5 | big-ip_fraud_protection_service | 13.1.3 | |
| f5 | big-ip_fraud_protection_service | 13.1.4 | |
| f5 | big-ip_fraud_protection_service | 13.1.5 | |
| f5 | big-ip_fraud_protection_service | 14.1.0 | |
| f5 | big-ip_fraud_protection_service | 14.1.2 | |
| f5 | big-ip_fraud_protection_service | 14.1.3 | |
| f5 | big-ip_fraud_protection_service | 14.1.4 | |
| f5 | big-ip_fraud_protection_service | 15.1.0 | |
| f5 | big-ip_fraud_protection_service | 15.1.1 | |
| f5 | big-ip_fraud_protection_service | 15.1.2 | |
| f5 | big-ip_fraud_protection_service | 15.1.3 | |
| f5 | big-ip_fraud_protection_service | 15.1.4 | |
| f5 | big-ip_fraud_protection_service | 15.1.5 | |
| f5 | big-ip_fraud_protection_service | 16.1.0 | |
| f5 | big-ip_fraud_protection_service | 16.1.1 | |
| f5 | big-ip_fraud_protection_service | 16.1.2 | |
| f5 | big-ip_fraud_protection_service | 17.0.0 | |
| f5 | big-ip_global_traffic_manager | 11.6.1 | |
| f5 | big-ip_global_traffic_manager | 11.6.2 | |
| f5 | big-ip_global_traffic_manager | 11.6.3 | |
| f5 | big-ip_global_traffic_manager | 11.6.4 | |
| f5 | big-ip_global_traffic_manager | 11.6.5 | |
| f5 | big-ip_global_traffic_manager | 12.1.0 | |
| f5 | big-ip_global_traffic_manager | 12.1.1 | |
| f5 | big-ip_global_traffic_manager | 12.1.2 | |
| f5 | big-ip_global_traffic_manager | 12.1.3 | |
| f5 | big-ip_global_traffic_manager | 12.1.4 | |
| f5 | big-ip_global_traffic_manager | 12.1.5 | |
| f5 | big-ip_global_traffic_manager | 12.1.6 | |
| f5 | big-ip_global_traffic_manager | 13.1.0 | |
| f5 | big-ip_global_traffic_manager | 13.1.1 | |
| f5 | big-ip_global_traffic_manager | 13.1.3 | |
| f5 | big-ip_global_traffic_manager | 13.1.4 | |
| f5 | big-ip_global_traffic_manager | 13.1.5 | |
| f5 | big-ip_global_traffic_manager | 14.1.0 | |
| f5 | big-ip_global_traffic_manager | 14.1.2 | |
| f5 | big-ip_global_traffic_manager | 14.1.3 | |
| f5 | big-ip_global_traffic_manager | 14.1.4 | |
| f5 | big-ip_global_traffic_manager | 15.1.0 | |
| f5 | big-ip_global_traffic_manager | 15.1.1 | |
| f5 | big-ip_global_traffic_manager | 15.1.2 | |
| f5 | big-ip_global_traffic_manager | 15.1.3 | |
| f5 | big-ip_global_traffic_manager | 15.1.4 | |
| f5 | big-ip_global_traffic_manager | 15.1.5 | |
| f5 | big-ip_global_traffic_manager | 16.1.0 | |
| f5 | big-ip_global_traffic_manager | 16.1.1 | |
| f5 | big-ip_global_traffic_manager | 16.1.2 | |
| f5 | big-ip_global_traffic_manager | 17.0.0 | |
| f5 | big-ip_link_controller | 11.6.1 | |
| f5 | big-ip_link_controller | 11.6.2 | |
| f5 | big-ip_link_controller | 11.6.3 | |
| f5 | big-ip_link_controller | 11.6.4 | |
| f5 | big-ip_link_controller | 11.6.5 | |
| f5 | big-ip_link_controller | 12.1.0 | |
| f5 | big-ip_link_controller | 12.1.1 | |
| f5 | big-ip_link_controller | 12.1.2 | |
| f5 | big-ip_link_controller | 12.1.3 | |
| f5 | big-ip_link_controller | 12.1.4 | |
| f5 | big-ip_link_controller | 12.1.5 | |
| f5 | big-ip_link_controller | 12.1.6 | |
| f5 | big-ip_link_controller | 13.1.0 | |
| f5 | big-ip_link_controller | 13.1.1 | |
| f5 | big-ip_link_controller | 13.1.3 | |
| f5 | big-ip_link_controller | 13.1.4 | |
| f5 | big-ip_link_controller | 13.1.5 | |
| f5 | big-ip_link_controller | 14.1.0 | |
| f5 | big-ip_link_controller | 14.1.2 | |
| f5 | big-ip_link_controller | 14.1.3 | |
| f5 | big-ip_link_controller | 14.1.4 | |
| f5 | big-ip_link_controller | 15.1.0 | |
| f5 | big-ip_link_controller | 15.1.1 | |
| f5 | big-ip_link_controller | 15.1.2 | |
| f5 | big-ip_link_controller | 15.1.3 | |
| f5 | big-ip_link_controller | 15.1.4 | |
| f5 | big-ip_link_controller | 15.1.5 | |
| f5 | big-ip_link_controller | 16.1.0 | |
| f5 | big-ip_link_controller | 16.1.1 | |
| f5 | big-ip_link_controller | 16.1.2 | |
| f5 | big-ip_link_controller | 17.0.0 | |
| f5 | big-ip_local_traffic_manager | 11.6.1 | |
| f5 | big-ip_local_traffic_manager | 11.6.2 | |
| f5 | big-ip_local_traffic_manager | 11.6.3 | |
| f5 | big-ip_local_traffic_manager | 11.6.4 | |
| f5 | big-ip_local_traffic_manager | 11.6.5 | |
| f5 | big-ip_local_traffic_manager | 12.1.0 | |
| f5 | big-ip_local_traffic_manager | 12.1.1 | |
| f5 | big-ip_local_traffic_manager | 12.1.2 | |
| f5 | big-ip_local_traffic_manager | 12.1.3 | |
| f5 | big-ip_local_traffic_manager | 12.1.4 | |
| f5 | big-ip_local_traffic_manager | 12.1.5 | |
| f5 | big-ip_local_traffic_manager | 12.1.6 | |
| f5 | big-ip_local_traffic_manager | 13.1.0 | |
| f5 | big-ip_local_traffic_manager | 13.1.1 | |
| f5 | big-ip_local_traffic_manager | 13.1.3 | |
| f5 | big-ip_local_traffic_manager | 13.1.4 | |
| f5 | big-ip_local_traffic_manager | 13.1.5 | |
| f5 | big-ip_local_traffic_manager | 14.1.0 | |
| f5 | big-ip_local_traffic_manager | 14.1.2 | |
| f5 | big-ip_local_traffic_manager | 14.1.3 | |
| f5 | big-ip_local_traffic_manager | 14.1.4 | |
| f5 | big-ip_local_traffic_manager | 15.1.0 | |
| f5 | big-ip_local_traffic_manager | 15.1.1 | |
| f5 | big-ip_local_traffic_manager | 15.1.2 | |
| f5 | big-ip_local_traffic_manager | 15.1.3 | |
| f5 | big-ip_local_traffic_manager | 15.1.4 | |
| f5 | big-ip_local_traffic_manager | 15.1.5 | |
| f5 | big-ip_local_traffic_manager | 16.1.0 | |
| f5 | big-ip_local_traffic_manager | 16.1.1 | |
| f5 | big-ip_local_traffic_manager | 16.1.2 | |
| f5 | big-ip_local_traffic_manager | 17.0.0 | |
| f5 | big-ip_policy_enforcement_manager | 11.6.1 | |
| f5 | big-ip_policy_enforcement_manager | 11.6.2 | |
| f5 | big-ip_policy_enforcement_manager | 11.6.3 | |
| f5 | big-ip_policy_enforcement_manager | 11.6.4 | |
| f5 | big-ip_policy_enforcement_manager | 11.6.5 | |
| f5 | big-ip_policy_enforcement_manager | 12.1.0 | |
| f5 | big-ip_policy_enforcement_manager | 12.1.1 | |
| f5 | big-ip_policy_enforcement_manager | 12.1.2 | |
| f5 | big-ip_policy_enforcement_manager | 12.1.3 | |
| f5 | big-ip_policy_enforcement_manager | 12.1.4 | |
| f5 | big-ip_policy_enforcement_manager | 12.1.5 | |
| f5 | big-ip_policy_enforcement_manager | 12.1.6 | |
| f5 | big-ip_policy_enforcement_manager | 13.1.0 | |
| f5 | big-ip_policy_enforcement_manager | 13.1.1 | |
| f5 | big-ip_policy_enforcement_manager | 13.1.3 | |
| f5 | big-ip_policy_enforcement_manager | 13.1.4 | |
| f5 | big-ip_policy_enforcement_manager | 13.1.5 | |
| f5 | big-ip_policy_enforcement_manager | 14.1.0 | |
| f5 | big-ip_policy_enforcement_manager | 14.1.2 | |
| f5 | big-ip_policy_enforcement_manager | 14.1.3 | |
| f5 | big-ip_policy_enforcement_manager | 14.1.4 | |
| f5 | big-ip_policy_enforcement_manager | 15.1.0 | |
| f5 | big-ip_policy_enforcement_manager | 15.1.1 | |
| f5 | big-ip_policy_enforcement_manager | 15.1.2 | |
| f5 | big-ip_policy_enforcement_manager | 15.1.3 | |
| f5 | big-ip_policy_enforcement_manager | 15.1.4 | |
| f5 | big-ip_policy_enforcement_manager | 15.1.5 | |
| f5 | big-ip_policy_enforcement_manager | 16.1.0 | |
| f5 | big-ip_policy_enforcement_manager | 16.1.1 | |
| f5 | big-ip_policy_enforcement_manager | 16.1.2 | |
| f5 | big-ip_policy_enforcement_manager | 17.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E33BCA5B-CE91-451C-9821-2023A9E461C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9DEE8658-1C3C-4245-960B-C0EA5A6843AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D7461621-52A4-46AF-AD61-651CEF43DF29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9EE524-2CA9-4252-8BC6-0C438C27AA5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F1AB0A-F56D-4154-A992-D4EE722E0922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD2044C-AC6F-4145-B1A0-8EB26DCF1F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5FC866D4-CE8C-4408-AD1E-8643AC554CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7563D979-BE37-4251-B92E-0DBDBE53F3FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "846E0609-BDD4-4B55-AC35-325D437CE2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "35ADE9D3-F6FF-4418-83B6-42896B200CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8503D6-43CC-436E-A9DB-EC99C3E79C43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C6781DA7-9577-4FDE-8170-CC8DD90BD1AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5491BC3C-EE0C-43FA-B870-BBF9FC4FADB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "41408E51-04CC-4208-9DBA-0A5A90EFC7A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C90F3BA6-6466-48C5-A621-B44549419496",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79A3A605-EBE9-4C50-B6F4-5FBD385FA8B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E688B1-28C4-4F9A-9474-381FD22E792D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "25DAD24A-2D43-498E-BC43-183B669EA1FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B25A33B9-2485-4D80-8F49-9B4688A39345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3E81E7-3E6A-46AD-827D-14046D93144E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C9416AE8-7C48-4986-99E8-5F313715B6B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA6CE41-1D13-4A7A-94D8-C0D5740870A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29041413-B405-42A6-B9E9-A3E7C3AC1CB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9F0C4673-2F1D-45B6-BC18-83EF68BA3601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0148360C-1167-4FF9-B231-3D53890BD932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "214D3CD8-6A1A-4119-B107-0363D34B3458",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA06267-4A87-4249-8A08-5A78BDCEE884",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EF96CE38-E834-475C-92AD-97D904D8F831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "702ACADF-C7FF-43C9-89A9-5F464718F800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E9747B-6167-4E8B-AF48-AA55C900C872",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD637AF5-F7D1-428F-955E-16756B7476E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CBAB92C5-2D50-49CC-AECA-0D16BC44A788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2F8B716B-4DD7-44E8-B5B1-801E44788617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC91813-5F3A-470A-B412-2A9459CB05B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "288CBF25-9746-4735-9BE4-65D8B1DB383B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "467F464E-8E51-42AA-BB17-1D3964E004AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC827031-CA39-4081-8CE0-30EAC78DF756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7569903B-3A15-4A10-863B-6828337DD268",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "45825991-D17D-42F1-87B4-7DF86B098B45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC60E41-1190-49D3-B684-4B1313D2F469",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "16E2F78D-7665-4A8E-9341-131352D6A929",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3B593325-3779-4125-A0E9-869493799E35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D57EB50F-D82C-4826-9545-58C22877F531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76EAD6EA-811F-4193-A83D-E70A9A53AFC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE9857F-4A59-4A9E-821C-BAF3AB450155",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F691A4ED-EB2A-4FF1-B701-02F3A966BA40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "26DE1D99-5118-4DC4-8B37-E9448378B64D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "200AC72D-719D-4663-BE05-C9C7826DEA68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4BFA5B4-AFC0-4E4C-A4E7-ED7BFDC3411F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "987AEEE0-9301-4F36-BB52-9C260741522F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51A3D5FE-1B2D-44F3-83DF-BBB3DFBA2DBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "189D37B0-49A3-4369-8F85-325355BE5B29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71B7081C-A869-402A-9C58-219B3225DB70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA89EA2D-9053-4B84-AE93-208F7640750B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "153BBF00-C7A3-4654-A4F4-2F3DD54A5814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCA2C3F-7E1E-48EA-92CF-1AF5274F5012",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "950A7D6C-DCA1-4B8E-B3C2-15F1845FF0D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5788C636-64A1-4A9A-BB1A-EBC4ED80C59E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "48F2498F-8691-4325-8B3D-E56A5CE3F3D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CF19BEB3-1624-433C-9C6C-BE71752A5FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85E54209-6418-4ECE-91EE-A36D82E4AFD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C8332960-4AAE-4101-8FFF-2D07B6479BD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A065BC0-56BD-4665-A860-EBA37F1A4D8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "76368B4B-226C-4E23-83D0-7F2CFE371852",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D64A7243-E711-45C9-8CB7-C45C1800D169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9269C1C4-505B-4B1A-9792-791A8E5A26D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F73F862B-10C3-4F5D-8B11-A31A972C1893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "77192AFB-B612-4BAA-916C-3DF8E851CC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AE295AF6-2B35-467F-8501-B5753CDDE16C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C03B68-914F-4DB0-A832-B626B8746524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "21128B70-DCED-414E-836C-3DB2F1AF20EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B5E69048-A88C-410E-8A33-C9F5BAE1403E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2988A0BF-CF63-4F17-AF49-47E90FF71C08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "73B02887-C0FD-4D46-8583-A0B9F4F4C4EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2D536A57-C7DB-4CE1-AE13-254C650343A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "492707EC-69DD-4795-9438-46E5E9627F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "318C9307-E64D-44D4-852F-710DC0768904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E8A93796-89EB-49ED-A08E-E8EDC89EE4F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "129F1B0B-44E4-4F67-B0B6-43CD2734F30A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D3F5F2BF-708F-40F6-9BD0-4779DE9A1785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9FA335-23DF-4206-853A-934B41A20525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE1D83B-7E70-4AF0-85BF-530FD1F66825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "41D3317C-4A3C-48D2-A56F-7D50E2CE7759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "08E29063-889A-4499-AEAC-D79165EA34A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6550AF19-D3CD-4FD2-AABD-EF02579D0862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "670D14AF-EF88-4F82-B295-30BE34745808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1BA899CE-26F3-42C5-8AF5-ABD2E3E01CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61795EB4-7DFF-4168-B1C3-375DA353C678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D10D74-5C97-44DE-B667-3011BBA585F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F2E0BDAB-9EB9-43FB-B49C-CC8440CAF1AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "59742F26-53D5-49A7-B456-71FD322EFD97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B7DCF9E7-F55B-4448-A35A-42C26BA7123E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0A9081-15D2-44F7-B66E-5C594F7C8066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "48BE0210-7058-462A-BA17-845D3E4F52FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C21E3CFF-ED97-477C-9CC3-0E02A2452F30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1F2DE800-03D6-4556-AA8B-94301162CE39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "94BCD296-517B-4FD0-AEBF-F3A4DB1583B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CC8D2671-09E6-4761-A48E-C3C87A1C17EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA90FB8-E2CD-400F-B753-1B482E7FAC96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC804B-35DB-4A0C-9AEA-15527E0CC1B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB228A9-0C01-4531-B2B2-38BB7B0E02E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9A12E4-25DA-4ADB-8CD1-6C0DA978625B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6078DDF8-83C0-4088-BC6C-119EBADEF26F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "923F5595-C161-49BD-B504-738ABF869858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "93A90C66-2F1D-4AE4-86DC-BC4008466E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "074CB0CC-E7CD-402E-9EFD-954DAB79D68B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADBE394-9E74-45FE-A8C2-9F3479A60324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6A8BB611-EA5A-4403-90DA-89F267AD3DBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F02F4AF2-922C-4CF5-9B18-588899603F27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF66FD8-CDA5-4E44-8A0D-9FF07E8C1E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "22FF4312-2711-4526-B604-796E637139E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF145312-4BF7-4BD1-853C-4A3F6FDF2311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B878A1C5-0FA9-46A6-93D3-9A15652CD2B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4E94B20-41C4-4441-A208-B44F1AFE79C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5C32BB88-ECE9-49C1-B75D-D47A17399C10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DF25F766-7DF2-4BBB-881C-6C43C801126A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB1E835-DDA7-4D3A-B92A-DF88CE9509F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9094D9E8-4B45-4714-9626-5866B17B0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "967FD30D-8806-4C8A-BBCD-2C84FCA42BD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D619D58E-D8A8-423C-BB46-EBEDCD887D92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "530F58C3-EED0-4641-B71D-8F27006EBAD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88C68A60-A500-45BA-AE56-C7B2F3122691",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7EAF3C-66C8-43D2-B276-77D56CA6E63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EDEBE106-40F1-439C-8154-187D89988C3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "94DBCD7A-E4DA-4C08-87A4-960CF53A83E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0221C238-8DF6-44EA-B390-15EEB180902E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "95599B32-F922-4948-885C-A8DE0CAEE2DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "47300DC0-693E-4971-BAFD-12B16FBD3BBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "46D9C9C4-AF8A-4B51-8AEA-28F5B784AA79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB2118A-0F9C-4273-BB07-85FEA32C785B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8541C9EF-69A8-4641-B173-3BCE0EDD20A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E24A3C71-0075-4738-B114-267337D050CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A906E40D-7386-4A83-89D7-8EA0BDF5ABD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "18433DF6-2F3E-4527-943E-39D64A84B7EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "010F5633-B6B6-4C31-AD04-E1119D75D5B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "15DF249E-7BA6-4321-BFD8-EAAE9DCDFFF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FDBD38-369B-4007-8D9A-B65B83B2AABD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "69F18D98-3C29-4012-8A3A-0D7FB55F5735",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "168FDFB8-CD1F-49C7-89BB-87278795E582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0BAFFCAB-144B-4C2F-88F8-D35930012F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9D030F54-8F3E-4844-8B51-B93A31805010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "907FEE11-DF3B-4BE7-9BAE-5F6BE20E469D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "49C435C8-DA39-41AF-9E42-AE50C96F9C66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "817F7B3C-1CAC-4BD3-BD1A-C271C9516701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8B89FE04-D25D-4FF0-9421-B8BED0F77997",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14612AC5-945C-4402-AFF0-5FCE11B7C785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A03DD77-08C8-482F-8F79-48396ED0BF1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "219F951F-C59B-4844-8558-6D07D067DF7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE8FA530-5502-4FE1-A234-5E313D71B931",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6578F36C-12EF-49E4-9012-2ECCE8770A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "00141CBE-3AF5-40C3-B9D6-E9E61CFABECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56FC4AD6-EC04-4BC0-8B13-6AE9805AA8F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A1BC7E64-0621-487A-A612-C82CC040FD90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "46203B9C-8815-44FC-809B-A24F988CC5AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AB53DF-7335-462E-B8CD-44DF0DCE3826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "26E6EC85-AEDB-41DB-95A9-5514980C2C67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E1D756CF-ABB5-4284-8BA6-06C85017551F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BCCF356-7A30-4B59-84C4-C9B881BF4D17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "53DB69A8-AB14-4D17-B5DF-2AFFDD015194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1BC3257A-EE34-4EFC-ACE4-2D5CA663F1F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "55DD7394-BD0A-42FD-A367-827F35397A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "98509F74-301A-4D1F-A2B4-B01B80CEFFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E87FFF5F-5BB1-4E2F-BD15-3BA7C9B26FEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "05B43CBF-8448-4415-94B1-F0279C1F6440",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "929B2EA3-2DF2-4D03-B0F8-F4137E9FACA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3FDAC16D-6C22-48DB-9D95-CCFBFDE6F204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AD9FC84C-DE82-4A92-8598-F35EA10D8A38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAFAF12-3981-4180-9C2C-994B93DACFCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB4AD1C2-6344-43C9-8887-60D39291D397",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "809DE9DF-A873-4953-BE12-766D5D6E12CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4EACF-64F4-4FB7-A257-F13972064C55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "397CC387-5F68-40F7-8B82-A29B160C9F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C529A4BA-F1B7-4297-A9CC-2FF0EB2CB5AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "106CE093-FAED-499F-961B-11484D4A1508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A0092DB5-0E5B-44DE-8299-B8AFDD18526C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C2ED3051-5100-4214-B212-C039F1CCCC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74DEDC05-82FC-4AD5-9DDD-D0D68DA9E26D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4CDFC55-EE03-4A97-B122-1F459562B074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AED85D4E-09B0-4A5F-9630-561731543064",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6BADF2CC-1D6F-4711-ADD1-02AE987079FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "86B5BB56-DFB0-4859-9980-A72D69C0747B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B7851945-44BC-4B08-8156-EFC08793DC90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6943EFA5-D2C4-4255-B175-6F876A06DE81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "579581AF-464E-47E2-9345-1B29B8846346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BDE33ED3-2629-456A-AC7E-62255D6E5FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4E36FE-C4C7-4C00-A65A-41F50FCE017D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "161BF669-A4E7-4B2E-98EA-8D7A8DDDE52D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA50CBB-8EBB-470F-BAE0-99399372F84D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "024B3B11-136C-4F57-9C50-8F952F174C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "59188694-B986-463E-9B65-B640761F9250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9B9EC602-86AA-48AC-A732-C8C14311FEEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B6B050-CB8B-496A-A015-265B9D02D0E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65AF109B-BF06-4DE2-9140-F73F1FF0BD89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BB0F7F15-44A8-4859-B04A-5C156E6CA3DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C1661922-B25B-4244-8AA9-95FADA6CE088",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7DB48EB6-5CA1-4E56-A486-5267CAF4FBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3A6265-5AE7-4B25-8801-CDF07C2AD5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB069F24-EBAD-4E10-BD2A-F745D7CD2F6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A58E8A11-9D44-48BA-BCE1-3505F18E0D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A54FE871-70AB-4F8D-9588-B473D8820683",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4E0F72D7-792A-4CD8-8DED-318FBB9F8CDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9A79D035-9F77-4FCA-8E36-E01ED7BB71A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F933F2D2-1C1D-43F0-9BD2-4699716E4A94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1013320D-D0EE-461E-AF90-049F82AC910E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "91918377-CD4C-40B6-A167-4F596EA9D2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AA222867-59E6-4C3E-8F4D-003D51D93BA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E83A8D13-E491-4CEA-8761-9C6B39CCD402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3E634D59-2B6D-49B8-A7BD-E2962CD2B455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "382A68A9-76FE-4FCC-86A8-A96D9EBB5C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DC0FF34-57F5-4454-9EDB-755F60EDC89B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68E110D5-07A4-4D45-B623-D0A8894A0E39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9784D592-2275-4B76-BABC-A68C5C995C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "93E7270E-62BF-4974-8ACD-D9E0A6AA77D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D211D419-03FA-4E64-9551-D19B73634E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E50E357C-95EC-4278-BB26-8BC94B92CC70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "46C7A912-01EE-4301-84A0-465F97C8F30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0954BD-CC9C-448F-A9C1-3FB71AB27D6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "911BB6DB-B2D1-4855-A65C-F0799E034358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EB089D73-31D3-487E-91AC-DB5E123B7951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4050AF7B-BB6C-41C5-8E0F-9AF4D541823D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "593AEF30-40F8-4D09-AD0E-2A64AE6420E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "37150BBE-E8B4-4B12-A644-8889676BE752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06E2C448-F279-476E-9F54-185582BEE9E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5943AAEF-A816-4F95-A91F-023A226D6459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72E78A8D-6CB6-49F9-9288-9C2EEF41441A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "483FB980-CA33-4C60-B267-954BF7E17B01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36880460-02CA-41A7-8C2A-42A312C28351",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88A8AAC0-8AAB-4299-A238-7173AA92923F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1B69FDC8-E564-4181-B290-1BAE1D28E4BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB414A2A-AA17-4137-8881-9B7BAFA5E918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A3934E25-3F98-41C7-A7C8-AEA821117C34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB3876A9-929E-45B4-A3FB-B6B4445B4345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9401493B-D219-4812-AA8B-A2FF43FF1BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE6221A-F603-411E-A36F-ADE237C4B35E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF46DCE-2603-4E61-87B8-352FF4111567",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6989D6-DCB0-47C4-9884-3C7B9BB39652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "35F63FB6-FD94-409A-A00B-7D73C6A35974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "108A4319-E52F-4DFD-A5E2-7F0623FE0B2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5756EA61-D0E4-4AC1-882D-71EE4BB6CEB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADBB0BD-F67B-43AD-AC6C-4B5EEF37BFF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "427986E1-F438-42A5-AE19-D70C76C35DE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFCE08F-8FEC-478A-8620-BACE3F78BC75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E44E67B9-2A93-49AD-A8D8-A670D9F6DD0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEEEB4CB-ADED-46F9-85F8-5B8319811B30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "75641260-5656-4717-9912-FB3AF67DEC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D373DB4-A175-4196-AC1D-AD2F8845DE53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE43C4B8-77B8-4AC0-BD92-33E19A7FD87D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B04EE3A2-A09D-41C3-A5F2-DAC007041B14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C641B4F-DCFF-4A1B-9E00-EDF18A270241",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FBC82477-C45E-47F7-91B7-6E170EE88D02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E743564E-4F82-4F58-BBCC-756E0D1719CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7E6E28A5-849D-4951-819A-FD313BD338E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "30AD01FB-1848-4FB6-AEDB-146FE045ED07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBBB6E7C-DA1A-479F-9DD2-DE0C3CA82E92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4913B437-33FF-4B5E-A855-9DA00B35E3B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EDCFE65B-340B-4F7D-93A1-4390BBC8E67F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCEFBC4-4A0A-4C3A-BF7E-39C09E25CAD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "42AF845A-5755-4C06-BADF-734E6874EC8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "78CC6E4B-5240-412E-986A-94DAA65DECB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DA63A58D-32C6-44AA-A63B-0744618C239F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06A1E194-8FBF-4546-B8D6-6C3B9B142401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "926CAB4C-164D-410F-9B48-F6510A6FF464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE88D9B-F7BE-48CB-8776-1CBABFE33A9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA16E9D-D877-4BFB-BFFA-2203852927F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "26873D65-5406-45AF-A7F4-14AF2C55D368",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71666E6B-8615-4D7B-9A7B-2F6D048FE086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4841BDDC-DBDB-48C1-B841-DF3477A8A27C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "371D42CC-39CB-4F17-AF8F-195BC58F415D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9A1D5B-D2A6-4AEE-989F-18C607FA51A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E847B072-2E86-416D-9D39-FD796770A0B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C55AD7A-B63D-4DCD-8222-28CBC64900C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "282D7673-A22C-4CCB-8476-0ACE0AEE4A90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB3DF801-A0D8-43EE-92D6-8F0010CF1B76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "41122A97-81A2-4C3C-97F6-A89AA246503A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AE56D9-DDA5-4F8C-8F37-3C1090A95349",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "79C95A86-994C-4F7C-A2E8-A688EE8E8286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "35E73A7E-5AFD-4E8F-97E9-3D3955B38CFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "588E8731-0160-4664-8BC4-45F7F55B58F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B147BB-1B2E-4F40-9FA7-1165B8F0B60D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B502F2-404C-463B-B6BE-87489DC881F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FC2E0F-763D-4C13-A3ED-E5EE0150C2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C0E94252-1980-4EE0-8289-CCD4E5B4F29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2478D7-7400-4FC8-84B9-77DB43AFC6B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB3BD31-D6D8-4AEE-B1DF-46ABBDCD5416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A82C7B1C-E195-4D94-B604-78FB464C4F81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F6C3144-D0DE-4248-BFCD-04A7E6104044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0357B5ED-0600-4756-93E5-692987068596",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "290DB9CD-21EC-4BE7-AD81-DC6178408CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B8836678-CC0D-47A3-A6C8-B4C56CFB3574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E4EDA2C9-9A62-48DF-99A1-F2E7EABD79F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "263197B2-7BEB-48DF-A7A3-A2EA0DA49FA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD7E85A-BE85-4CA1-B9CB-0888735EA132",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB28BCE-A389-4327-8DB6-D745E0F95C5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CC063A34-AB9C-47AC-A6A6-9A920C5E63B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "62F9FDD3-D238-44EF-8AF4-5B1987AA3E2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4E37750C-50F3-480A-AA40-23D59F50E4B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A724B2F3-E3FA-456F-9581-0213358B654C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0F6CE564-D51A-4ACE-8A09-CE65D1713EB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C231E06C-1121-49BD-B5FB-CB45A4D10810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4D001D61-CC58-4FFF-9B1B-44046DB5FAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "461C4C1D-B0F9-44EF-A535-BCE9FE501A94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC35855-E381-49ED-B929-1B2F1E107615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2359AD-205D-49B8-821D-5569F63F91FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "56846B46-E0FC-4921-BE96-368F7CB2FB15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D8FCEF-C962-404B-8663-D11C277F9839",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7C07A0B7-25D3-4599-9047-8FF889AD0A23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E2B279F-8EE5-44FD-9EFE-48C652289CF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "69C053C3-AFD9-4A24-83A8-08F8D5614ACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "994D457F-259C-460E-A3E1-CB2F737A2181",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "73FB842B-33B1-4AD4-AC61-47192A87A785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1EA4F45-35F7-4687-8D1A-A5ACD846500A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30BD328A-30C0-42B2-A08F-ED269DB3D285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "328203DD-814D-4F24-BEF0-05E63690EF15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FA953694-D738-4703-9699-BA9F1658C2E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2620E19E-8F81-4F94-A422-E14AC6DC369B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "64273A2C-E5A1-4605-92DD-EBECC7F051D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E60CA151-1C3A-45B3-B939-E6F80063C595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "58BAD5A9-9C67-4056-9344-07C8C42C8E88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4031DCCB-5110-48B6-9906-7893553ED908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4BBBBAE5-E3B4-42CF-B66D-E85345333A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "09D82EEE-AAB6-4FB4-9C97-3ABC619CE757",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "32E709A6-5E8C-4739-BAD8-AA7CE5C8495F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0948894-8098-4532-9E4A-9491E3761C95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DE353F-F350-41E4-ACC6-0E854B939830",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "93CF4D85-6EF9-4341-85EC-04CAE039E605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2161F566-5F88-492D-BD84-7AE8D6E1AA38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F754F6FC-2A29-453F-9E9B-39C779830562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2BDE4D90-5AE4-4183-997E-188FF17D497E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "05C36C95-6191-4C6F-978A-1303E4D75126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4ABEFBF8-9888-4B1D-9912-97C501AFC895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "98A1FBEB-A427-43A8-B2AB-2E331585D512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C2B883-EA96-4B51-865B-B1DE1561096C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C091449-089A-417E-B77C-A4EE1FB86597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4FB05CC1-69F8-4959-8666-D106C0D27826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A6EB971F-907D-49C8-8B59-EA3895394A21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F3E3A8-0AB8-4F89-961B-AE4BFDE979D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "65AC40D8-1554-4BB6-BD8A-055137A79E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7FB3D02-E919-4F91-8FF6-32E78593C014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E26FB91C-AF0E-4996-8F52-FE4348152BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "658A1401-D4C0-47C0-B932-FB46E04697C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "509A4307-3EC4-4AE7-AF72-3C2B3CF9E754",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
},
{
"lang": "es",
"value": "En F5 BIG-IP versiones 13.1.x anteriores a 13.1.5, y en todas las versiones de 12.1.x y 11.6.x, cuando es configuradon m\u00faltiples dominios de ruta, las peticiones no reveladas a big3d pueden causar un aumento en el uso de recursos de la CPU. Nota: Las versiones de software que han alcanzado el Fin del Soporte T\u00e9cnico (EoTS) no son evaluadas"
}
],
"id": "CVE-2022-29480",
"lastModified": "2024-11-21T06:59:09.617",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "f5sirt@f5.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-05-05T17:15:15.173",
"references": [
{
"source": "f5sirt@f5.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.f5.com/csp/article/K71103363"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.f5.com/csp/article/K71103363"
}
],
"sourceIdentifier": "f5sirt@f5.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "f5sirt@f5.com",
"type": "Secondary"
}
]
}
GHSA-49WC-X7PH-Q668
Vulnerability from github – Published: 2022-05-06 00:00 – Updated: 2022-05-13 00:00On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
{
"affected": [],
"aliases": [
"CVE-2022-29480"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-05-05T17:15:00Z",
"severity": "MODERATE"
},
"details": "On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated",
"id": "GHSA-49wc-x7ph-q668",
"modified": "2022-05-13T00:00:24Z",
"published": "2022-05-06T00:00:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29480"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K71103363"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
GSD-2022-29480
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-29480",
"description": "On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated",
"id": "GSD-2022-29480"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-29480"
],
"details": "On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated",
"id": "GSD-2022-29480",
"modified": "2023-12-13T01:19:41.976573Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "f5sirt@f5.com",
"DATE_PUBLIC": "2022-05-04T14:00:00.000Z",
"ID": "CVE-2022-29480",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BIG-IP",
"version": {
"version_data": [
{
"version_affected": "!\u003e=",
"version_name": "14.0.x",
"version_value": "14.0.0"
},
{
"version_affected": "\u003c",
"version_name": "13.1.x",
"version_value": "13.1.5"
},
{
"version_affected": "=",
"version_name": "12.1.x",
"version_value": "12.1.x"
},
{
"version_affected": "=",
"version_name": "11.6.x",
"version_value": "11.6.x"
},
{
"version_affected": "!\u003e=",
"version_name": "14.1.x",
"version_value": "14.1.0"
},
{
"version_affected": "!\u003e=",
"version_name": "15.1.x",
"version_value": "15.1.0"
},
{
"version_affected": "!\u003e=",
"version_name": "16.1.x",
"version_value": "16.1.0"
},
{
"version_affected": "!\u003e=",
"version_name": "17.0.x",
"version_value": "17.0.0"
}
]
}
}
]
},
"vendor_name": "F5"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400 Uncontrolled Resource Consumption"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.f5.com/csp/article/K71103363",
"refsource": "MISC",
"url": "https://support.f5.com/csp/article/K71103363"
}
]
},
"source": {
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:12.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:13.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:15.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:16.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:16.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "f5sirt@f5.com",
"ID": "CVE-2022-29480"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.f5.com/csp/article/K71103363",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.f5.com/csp/article/K71103363"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
},
"lastModifiedDate": "2022-05-12T20:49Z",
"publishedDate": "2022-05-05T17:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.