mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
496 lines
21 KiB
JSON
496 lines
21 KiB
JSON
{
|
|
"id": "CVE-2021-23039",
|
|
"sourceIdentifier": "f5sirt@f5.com",
|
|
"published": "2021-09-14T18:15:08.423",
|
|
"lastModified": "2021-09-27T16:37:39.667",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.2.8, and all versions of 13.1.x and 12.1.x, when IPSec is configured on a BIG-IP system, undisclosed requests from an authorized remote (IPSec) peer, which already has a negotiated Security Association, can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En versiones 16.0.x anteriores a 16.0.1.2, versiones 15.1.x anteriores a 15.1.3, versiones 14.1.x anteriores a 14.1.2.8, y todas las versiones de 13.1.x y 12.1.x, cuando se configura IPSec en un sistema BIG-IP, las peticiones no divulgadas de un peer remoto (IPSec) autorizado, que ya presenta una Asociaci\u00f3n de Seguridad negociada, pueden causar la terminaci\u00f3n del Traffic Management Microkernel (TMM). Nota: Las versiones de software que han alcanzado End of Technical Support (EoTS) no son evaluadas"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.1
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "f5sirt@f5.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "DE2F2CB2-BE96-4DC8-B336-1E9A318B4604"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "50288008-B90F-4882-80AD-2C70A1F1E2DD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "874C243A-5A16-4942-AE90-A1B0D4078192"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "5F04F2FB-12C2-4BC4-AFBB-9DA82E53D7EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "C7D3DE51-EAA0-427D-8991-F2D9449F6F99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "6E32CBE0-BFDC-4DCB-A365-2F3C4D680446"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "C37ABF73-E093-498B-99F3-11D5A3908C7F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "81A56F9E-5939-4252-8643-0F768AE39E79"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "FA17368C-7B1F-4B73-8296-3FC2656C0F04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "E0B33987-329F-4C8E-948C-C797199E3D80"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "18666B67-A6EA-402B-926E-96348AB82831"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "18F2AC19-1085-48C3-B270-DD3E17A7870D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "350E17D3-C6D3-407F-B413-0D3D07A9A735"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "3EC583B6-59E2-431B-A574-0A700F5713A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "0EBE11A9-0ACA-44E3-A15D-BDD8B7CEC107"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "8AF5B8C5-98F2-45B5-A877-C3666E3D6876"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "EDDC86D0-B9D6-42AE-959E-CC40C6F275EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "AF90FBA3-69FA-4053-A749-E7F635A284C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "06D8F5CC-FD05-42EA-A3F2-49BB4A5009F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "53C5B43F-C4E5-481B-B909-55473427F62D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "1849279E-9FB1-4D6A-8386-337F7DF151DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "D17DCE22-99F8-422C-A414-86CFA78BA425"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "A76C1855-461C-4539-98CD-C22363B8AFE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "23CFD951-1C6F-4EE5-B8AA-06F29744F082"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "CE26ED82-4D38-4165-990D-4967AE130059"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "F489E5B1-1EC4-4E45-8EE6-6A4FCD0F386F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "F82E9A35-A3E2-4915-BE23-B321C18BE6C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "786C0192-BC78-463F-8305-E890F63F153B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "E2E2832C-0C5D-4051-A85B-162C5BF11DEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "81FB0566-9B8D-489D-B27A-44478903E284"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "01C01794-36BD-4783-B962-07000FCE4788"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "6B486BC4-2258-42FC-834E-22958ACFCA13"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "3798475B-3AA3-4DA2-A933-D49024C5C8C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "247A56A6-5486-49C4-88B1-4251337044AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "64E83F71-D91E-425A-B8F1-5E1790F2B30E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "5ED5A4F4-9FFF-43D0-B17D-838D6CEDDF04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "3FCEA7BA-FBAB-4D94-86D9-51B7F8E4C0A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "50DCC8F9-3393-4131-9B85-EBC2F9EEF4D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "9E599573-DAE5-4481-9BA0-7796D7101E67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "00210DD6-894D-4E43-A7B6-D3B6D508E037"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "16234A51-9C86-484A-B8D5-6EFB838CB564"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "ADE1E0A6-DE70-4D46-B493-671E23EEA32D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "75AB65FB-DC81-4F50-BC2A-BCAD1EC22635"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "D67E4394-E1CC-4492-95E7-DCDA13049517"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "8CCAFD36-1E86-4DC2-914E-EE32B8ED387D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "61189D3B-8BF1-47A7-B5AC-A75E44D6BD5F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "228F7E70-F93D-40BD-9C33-2A51CB6B931F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "66B64305-66FB-4C99-BD1A-BFE7BE23EE87"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "1B6F6F41-B775-4A79-8284-C7BE0DA49DAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "4F27D8D5-71EA-4FB0-A9A7-410BF1DEF68C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndIncluding": "12.1.6",
|
|
"matchCriteriaId": "9FBA5CDC-1989-4971-BD1B-F14E801F5017"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndIncluding": "13.1.4",
|
|
"matchCriteriaId": "F4574B7D-DFAF-4527-8E19-2E37650A1494"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2.8",
|
|
"matchCriteriaId": "8134C56F-5979-4501-99BC-40A9921EAAE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.1.0",
|
|
"versionEndExcluding": "15.1.3",
|
|
"matchCriteriaId": "50D58AEB-BB36-45A9-99D7-DC028F900707"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "16.0.0",
|
|
"versionEndExcluding": "16.0.1.2",
|
|
"matchCriteriaId": "C0ADA7B2-41F7-4ED7-A56B-594974B76F6D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.f5.com/csp/article/K66782293",
|
|
"source": "f5sirt@f5.com",
|
|
"tags": [
|
|
"Mitigation",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |