mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
695 lines
29 KiB
JSON
695 lines
29 KiB
JSON
{
|
|
"id": "CVE-2020-5913",
|
|
"sourceIdentifier": "f5sirt@f5.com",
|
|
"published": "2020-08-26T15:15:13.053",
|
|
"lastModified": "2024-11-21T05:34:49.020",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2, the BIG-IP Client or Server SSL profile ignores revoked certificates, even when a valid CRL is present. This impacts SSL/TLS connections and may result in a man-in-the-middle attack on the connections."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En las versiones 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1 y 11.6.1-11.6.5.2, el perfil SSL de Cliente o Servidor BIG-IP ignora los certificados revocados, incluso cuando hay una CRL v\u00e1lida. Esto afecta a las conexiones SSL/TLS y puede resultar en un ataque de hombre en medio de las conexiones"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
|
"baseScore": 7.4,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 5.2
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"baseScore": 5.8,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-295"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "378C0F52-6CBE-48F5-8519-D24C4367D0C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "EE0532FA-7B7B-46B3-AB10-0920034A7E43"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "77A8EFA2-50FD-4187-A6F2-7E05A10585E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "FC67CFDE-E2D3-4D1B-949E-2995588D8C6B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "83233B35-57F8-4A40-A180-3C42F85BF0AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "D086A390-BAD2-4ADB-A264-5B8685F395F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "9DF372C4-D79F-4802-BE4F-01E8A448D9AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "3B3DCE49-C37D-4951-AB57-7CDDEBA1C1E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "13B9A1CD-831E-4026-81B8-DDB390D2A918"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "E44B9216-9543-4418-99B4-989C1C3467D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "304282E0-1E87-41A2-867E-90A168B0B7DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "3AEFE84B-F4FD-45BC-AADB-61109FBC1F8C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "A5EE7886-BCB2-4D2C-A4B7-2113158FDBD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "694C630B-5342-4C6C-A0FA-050B9C76936D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "897C6803-07B7-492B-9EB8-DCE9A949DD49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "23D1794A-182F-4D9B-AA59-C9D3689F47CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "9442B20D-FA85-4C82-B27B-CD7C73DB0917"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "64AE5D33-1449-4EAA-888A-F7FDE20E4D32"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "703B32AF-BD3F-4CC2-8EB7-A16EB527EFAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "0C3E75CB-C764-4868-8459-1FAC03506EE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "3F3F7128-293E-4489-B2F2-E47B307D8855"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "F23CB964-2139-4FAE-A893-437D94D1B554"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "91764E34-0BF3-4EEE-A17E-D06E21CB8948"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "67B82A03-5E18-4F91-BA18-73620B0C18EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "7B58F5CB-BB8D-472E-B771-377C242ACE9B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "5D3F7911-FB00-4612-9109-9E7A407BC7B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "F5F74476-72A3-4A29-BFB4-C908288B5DAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "B0DCE542-CDC9-45C3-984A-FAB53C126CC3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "2A560E82-A738-43FC-8867-CEF02D154685"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "77D12694-ED1E-49AE-9E7B-3538F3D73B87"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "5E44EF88-78D0-404D-B757-06B53D491EB5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "91BF72A9-EB50-4315-B956-5926967DCC46"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "332440D2-9E8D-4E9A-8CCB-224734F85DD9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "C1267639-FDB1-4E97-B6B5-89B0FFF972BA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "A444DC0B-4628-47DD-BF37-E9ABAB7F3792"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "B0B2E7EA-F2E3-4FD0-B8AF-CAE1F4BA4734"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "09437477-8759-4B58-B0DD-3F940DBC4ACA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "39AECFF0-3A86-45A4-AB7F-DCC3717E8E97"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "64E02123-8D45-45B3-9ED3-D93E1BD8889E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "EB1DFC10-58A9-4476-B4D2-915B68CA160A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "F12DBA09-F595-4567-B38D-EAC6F9ADB7CA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "90B022DA-1DC8-4F45-B1AB-AF8D3443D840"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "88E8BBBB-AF15-438B-A9F4-7477D3FAA85C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "73EC8EDA-669A-4750-934F-3B3FBF557080"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "F1C3876D-E0E3-4D3A-AE2E-B84DC815AA83"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "F9A84413-479A-462B-ABB1-440847167A72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "53915623-FE9F-433D-916B-628AFEAFC07E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "BDFB204A-500B-45F3-B76F-FA7C711E429A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "4CF32331-D7E5-4A8D-A9C8-34A4A2B65171"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "A0581EEF-98E6-4961-8178-BA2D7647F931"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "FEAE3B73-78A2-41B4-BBB5-0EF3E8BC01AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "6FBC6195-8E5F-4384-AAF5-6B48A9868F33"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "26B5D49B-1DB5-44FB-8351-A10F7EAFF17C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "BA4334F3-18E9-4E5A-BCF9-BEF09C46354B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "0F951A67-312B-4691-965A-38FF3DBF6E35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "32773569-67FE-4F08-A613-E507FCDEACEF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "EE3B2238-5593-43D5-AFFC-7F3F5D7A0C4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "253F3CC1-9CFE-4F7A-8E79-B0F51334BB02"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "C7A32B24-E816-4893-8BDC-F4F0D8E05454"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "9525DE07-7391-450C-A547-32CECE5DD1C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "D3C0B6ED-2109-4B74-936D-F195C3571F6B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "4494F771-4026-478C-8004-B162653DC80C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "8D2C10B3-8D78-42BD-9C3F-AFB5D231FD0E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "D16B8A01-D409-457F-84B8-329653553997"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "29115749-D765-45CD-8B63-80886ED7A045"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "23AB4517-3319-45E8-B36F-395D7A9E1A3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "6B4449E0-21FB-4177-8179-10E7691CFC43"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "A97489DC-A5DE-48AD-BBA2-F9078070F53A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "6129CC28-2FA8-4FD8-824B-5BB8FFC67D2D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "44781822-29E8-466A-BAA7-4DABBF1E5057"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "C48148C3-827F-4C58-B804-D47629923D03"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "5E4374A2-0B0B-4710-B4EE-9243ACA04A75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "5A9631B7-C5CF-472F-BD09-51EC58D20C73"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "1EDB944B-DF60-45AF-AD60-33E9667E0D12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "4007A096-2F53-4FAA-9429-48ED292D576F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "C3C5CF9F-E4C8-40AA-B295-B299DEF032A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "12EBB8F8-A653-40EA-BAE4-782563D62B48"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "7B7A3FE8-2794-4422-924C-0291D71D5C26"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "11.6.1",
|
|
"versionEndExcluding": "11.6.5",
|
|
"matchCriteriaId": "B336F2DB-2E3B-4A79-AFA0-1FBAD3AF0ED5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "12.1.0",
|
|
"versionEndExcluding": "12.1.5.2",
|
|
"matchCriteriaId": "AE483701-8CB3-4745-BD47-B022EBEA2CA9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "13.1.0",
|
|
"versionEndExcluding": "13.1.3",
|
|
"matchCriteriaId": "4A4D142E-445D-40BC-8D65-B4A929606BE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.0",
|
|
"versionEndExcluding": "14.1.2-0.89.37",
|
|
"matchCriteriaId": "442E4D52-7EFC-432C-B20A-91668139B69A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "14.1.2.1",
|
|
"versionEndExcluding": "14.1.2.5",
|
|
"matchCriteriaId": "45F7E1F5-4F69-4AB5-B6C3-5D46D328A51F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "15.0.0",
|
|
"versionEndExcluding": "15.0.1.2",
|
|
"matchCriteriaId": "F83983EC-F453-49E3-80A4-8EF14800A78F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.f5.com/csp/article/K72752002",
|
|
"source": "f5sirt@f5.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.f5.com/csp/article/K72752002",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |