A directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility which may allow an authenticated malicious user to read files with .xml extension. Access to restricted information is limited and the attacker does not control what information is obtained. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
f5 big-ip analytics |
||
f5 big-ip policy enforcement manager |
||
f5 big-ip local traffic manager |
||
f5 big-ip link controller |
||
f5 big-ip global traffic manager |
||
f5 big-ip fraud protection service |
||
f5 big-ip domain name system |
||
f5 big-ip application security manager |
||
f5 big-ip application acceleration manager |
||
f5 big-ip advanced firewall manager |
||
f5 big-ip access policy manager |
||
f5 big-ip advanced web application firewall |
||
f5 big-ip application visibility and reporting |
||
f5 big-ip carrier-grade nat |
||
f5 big-ip ddos hybrid defender |
||
f5 big-ip edge gateway |
||
f5 big-ip ssl orchestrator |
||
f5 big-ip webaccelerator |
||
f5 big-ip websafe |