A directory traversal vulnerability exists in the BIG-IP Configuration Utility that may allow an authenticated malicious user to execute commands on the BIG-IP system. For BIG-IP system running in Appliance mode, a successful exploit can allow the malicious user to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
f5 big-ip access policy manager |
||
f5 big-ip advanced firewall manager |
||
f5 big-ip application security manager |
||
f5 big-ip domain name system |
||
f5 big-ip local traffic manager |
||
f5 big-ip advanced web application firewall |
||
f5 big-ip analytics |
||
f5 big-ip application acceleration manager |
||
f5 big-ip application visibility and reporting |
||
f5 big-ip carrier-grade nat |
||
f5 big-ip ddos hybrid defender |
||
f5 big-ip fraud protection service |
||
f5 big-ip global traffic manager |
||
f5 big-ip link controller |
||
f5 big-ip policy enforcement manager |
||
f5 big-ip ssl orchestrator |
||
f5 big-ip webaccelerator |
||
f5 big-ip websafe |