Description
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3 when running in Appliance mode, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Related CPE's
a
f5
big-ip_access_policy_manager
a
f5
big-ip_advanced_firewall_manager
a
f5
big-ip_advanced_web_application_firewall
a
f5
big-ip_analytics
a
f5
big-ip_application_acceleration_manager
a
f5
big-ip_application_security_manager
a
f5
big-ip_ddos_hybrid_defender
a
f5
big-ip_domain_name_system
a
f5
big-ip_fraud_protection_service
a
f5
big-ip_global_traffic_manager
a
f5
big-ip_link_controller
a
f5
big-ip_local_traffic_manager
a
f5
big-ip_policy_enforcement_manager
a
f5
ssl_orchestrator
References
https://support.f5.com/csp/article/K18132488
https://support.f5.com/csp/article/K18132488
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.9 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-03-31T15:15:12.823Z
4 years agoLast modified
2024-11-21T04:51:04.440Z
1 year ago