See a list of the latest CVEs we send weekly to subscribers.
APTIOV contains a vulnerability in BIOS where an attacker may cause an Out-of-bounds Write by local. Successful exploitation of this vulnerability may lead to data corruption and loss of availability.
APTIOV contains a vulnerability in BIOS where an attacker may cause an Out-of-bounds Write by local. Successful exploitation of this vulnerability may lead to data corruption and loss of availability.
In NetX Duo before 6.4.4, the networking support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _nx_ip_packet_receive() function when received an Ethernet with type set as IP but no IP data.
Mattermost versions 10.5.x <= 10.5.10, 10.11.x <= 10.11.2 fail to properly validate guest user permissions when accessing channel information which allows guest users to discover active public channels and their metadata via the `/api/v4/teams/{team_id}/channels/ids` endpoint
Stored Cross-Site Scripting (XSS) in Sergestec's Exito v8.0, consisting of a stored XSS due to a lack of proper validation of user input by sending a POST request using the 'obs' parameter in '/admin/index.php?action=product_update'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.
Insecure direct object reference (IDOR) vulnerability in Sergestec's Exito v8.0. This vulnerability allows an attacker to access data belonging to other customers through the 'id' parameter in '/admin/ticket_a4.php'.
APTIOV contains a vulnerability in BIOS where an attacker may cause an Improper Restriction of Operations within the Bounds of a Memory Buffer by local means. Successful exploitation of this vulnerability may lead to memory corruption and impact Integrity and Availability.
APTIOV contains a vulnerability in BIOS where an attacker may cause a Buffer Copy without Checking Size of Input by local accessing. Successful exploitation of this vulnerability may lead to arbitrary code execution.
SQL injection in Sergestec's Exito v8.0. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'cat' parameter in '/public.php'.
Whale browser before 4.33.325.17 allows an attacker to bypass the Content Security Policy via a specific scheme in a dual-tab environment.
Whale browser before 4.33.325.17 allows an attacker to bypass the Same-Origin Policy in a dual-tab environment.
In NetX Duo version before 6.4.4, the component of Eclipse Foundation ThreadX, there was an incorrect bound check in_nx_secure_tls_proc_clienthello_supported_versions_extension() in the extension version field.
Whale Browser before 4.33.325.17 allows an attacker to escape the iframe sandbox in a dual-tab environment.
In NetX Duo before 6.4.4, the networking support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _nx_ipv4_packet_receive() function when received an Ethernet frame with less than 4 bytes of IP packet.
HCL BigFix Mobile 3.3 and earlier is affected by improper access control. Unauthorized users can access a small subset of endpoint actions, potentially allowing access to select internal functions.
hcltech:bigfix_mobile hcltech:bigfix_modern_client_management
HCL BigFix Modern Client Management (MCM) 3.3 and earlier is affected by improper access control. Unauthorized users can access a small subset of endpoint actions, potentially allowing access to select internal functions.
hcltech:bigfix_mobile hcltech:bigfix_modern_client_management
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.7.7, macOS Sonoma 14.7.7, macOS Sequoia 15.6. An app may be able to access sensitive user data.
A double free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.6, iOS 18.6 and iPadOS 18.6, watchOS 11.6, tvOS 18.6, visionOS 2.6, macOS Ventura 13.7.7, macOS Sonoma 14.7.7, iPadOS 17.7.9. An app may be able to cause unexpected system termination.
apple:watchos apple:ipados apple:visionos apple:iphone_os apple:tvos apple:macos
The issue was addressed with improved authentication. This issue is fixed in macOS Sequoia 15.6. A local attacker may be able to elevate their privileges.
The issue was resolved by not loading remote images This issue is fixed in iOS 18.6 and iPadOS 18.6. Forwarding an email could display remote images in Mail in Lockdown Mode.
Authentication bypass in some Zoom Rooms Clients before version 6.5.1 may allow an unauthenticated user to conduct a disclosure of information via network access.
Command injection in some Zoom Clients for Windows may allow an authenticated user to conduct a disclosure of information via network access.
zoom:meeting_software_development_kit zoom:workplace_virtual_desktop_infrastructure zoom:workplace_desktop zoom:rooms
Creative Cloud Desktop versions 6.7.0.278 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to arbitrary file system write. A low-privileged attacker could exploit the timing between the check and use of a resource, potentially allowing unauthorized modifications to files. Exploitation of this issue does not require user interaction.
When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_application_security_manager f5:big-ip_websafe f5:big-ip_link_controller f5:big-ip_edge_gateway f5:big-ip_access_policy_manager f5:big-ip_next_cloud-native_network_functions f5:big-ip_application_visibility_and_reporting f5:big-ip_container_ingress_services f5:big-ip_carrier-grade_nat f5:big-ip_domain_name_system f5:big-ip_ddos_hybrid_defender f5:big-ip_policy_enforcement_manager f5:big-ip_local_traffic_manager f5:big-ip_next_for_kubernetes f5:big-ip_automation_toolchain f5:big-ip_fraud_protection_service f5:big-ip_analytics f5:big-ip_application_acceleration_manager f5:big-ip_global_traffic_manager f5:big-ip_ssl_orchestrator f5:big-ip_advanced_web_application_firewall f5:big-ip_advanced_firewall_manager f5:big-ip_webaccelerator f5:big-ip_next_service_proxy_for_kubernetes
When a BIG IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_application_security_manager f5:big-ip_advanced_web_application_firewall
When a per-request policy is configured on a BIG-IP APM portal access virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
A reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of BIG-IP APM that allows an attacker to run JavaScript in the context of the targeted logged-out user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
When IPsec is configured on the BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_access_policy_manager f5:big-ip_webaccelerator f5:big-ip_ddos_hybrid_defender f5:big-ip_next_cloud-native_network_functions f5:big-ip_application_security_manager f5:big-ip_next_for_kubernetes f5:big-ip_application_acceleration_manager f5:big-ip_websafe f5:big-ip_link_controller f5:big-ip_fraud_protection_service f5:big-ip_carrier-grade_nat f5:big-ip_policy_enforcement_manager f5:big-ip_local_traffic_manager f5:big-ip_analytics f5:big-ip_domain_name_system f5:big-ip_ssl_orchestrator f5:big-ip_application_visibility_and_reporting f5:big-ip_advanced_firewall_manager f5:big-ip_automation_toolchain f5:big-ip_global_traffic_manager f5:big-ip_advanced_web_application_firewall f5:big-ip_container_ingress_services f5:big-ip_edge_gateway
When a client SSL profile is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_next_for_kubernetes f5:big-ip_next_service_proxy_for_kubernetes f5:big-ip_next_cloud-native_network_functions
A vulnerability exists in F5OS-A and F5OS-C system that may allow an authenticated attacker with local access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
A vulnerability exists in F5OS-A software that allows a highly privileged authenticated attacker to access sensitive FIPS hardware security module (HSM) information on F5 rSeries systems. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Creativeitem Academy LMS up to and including 6.14 uses a hardcoded default JWT secret for token signing. This predictable secret allows attackers to forge valid JWT tokens, leading to authentication bypass and unauthorized access to any user account.
Creativeitem Academy LMS up to and including 5.13 uses predictable password reset tokens based on Base64 encoded templates without rate limiting, allowing brute force attacks to guess valid reset tokens and compromise user accounts.
In NetX Duo version before 6.4.4, the component of Eclipse Foundation ThreadX, there was an incorrect bound check resulting it out by two out of bound read.
A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell. For BIG-IP systems running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_carrier-grade_nat f5:big-ip_local_traffic_manager f5:big-ip_ssl_orchestrator f5:big-ip_analytics f5:big-ip_automation_toolchain f5:big-ip_advanced_web_application_firewall f5:big-ip_link_controller f5:big-ip_websafe f5:big-ip_application_acceleration_manager f5:big-ip_fraud_protection_service f5:big-ip_ddos_hybrid_defender f5:big-ip_global_traffic_manager f5:big-ip_application_visibility_and_reporting f5:big-ip_advanced_firewall_manager f5:big-ip_container_ingress_services f5:big-ip_access_policy_manager f5:big-ip_application_security_manager f5:big-ip_policy_enforcement_manager f5:big-ip_webaccelerator f5:big-ip_edge_gateway f5:big-ip_domain_name_system
When a virtual server, network address translation (NAT) object, or secure network address translation (SNAT) object uses the embedded Packet Velocity Acceleration (ePVA) feature, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. To determine which BIG-IP platforms have an ePVA chip refer to K12837: Overview of the ePVA feature https://my.f5.com/manage/s/article/K12837 . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_carrier-grade_nat f5:big-ip_local_traffic_manager f5:big-ip_ssl_orchestrator f5:big-ip_analytics f5:big-ip_automation_toolchain f5:big-ip_advanced_web_application_firewall f5:big-ip_link_controller f5:big-ip_websafe f5:big-ip_application_acceleration_manager f5:big-ip_fraud_protection_service f5:big-ip_ddos_hybrid_defender f5:big-ip_global_traffic_manager f5:big-ip_application_visibility_and_reporting f5:big-ip_advanced_firewall_manager f5:big-ip_container_ingress_services f5:big-ip_access_policy_manager f5:big-ip_application_security_manager f5:big-ip_policy_enforcement_manager f5:big-ip_webaccelerator f5:big-ip_edge_gateway f5:big-ip_domain_name_system
When a BIG-IP APM Access Policy is configured on a virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_carrier-grade_nat f5:big-ip_local_traffic_manager f5:big-ip_ssl_orchestrator f5:big-ip_analytics f5:big-ip_automation_toolchain f5:big-ip_advanced_web_application_firewall f5:big-ip_link_controller f5:big-ip_websafe f5:big-ip_application_acceleration_manager f5:big-ip_fraud_protection_service f5:big-ip_ddos_hybrid_defender f5:big-ip_global_traffic_manager f5:big-ip_application_visibility_and_reporting f5:big-ip_advanced_firewall_manager f5:big-ip_container_ingress_services f5:big-ip_access_policy_manager f5:big-ip_application_security_manager f5:big-ip_policy_enforcement_manager f5:big-ip_webaccelerator f5:big-ip_edge_gateway f5:big-ip_domain_name_system
A vulnerability exists in F5OS-A and F5OS-C systems that may allow an authenticated attacker with local access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. This issue may occur when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled with a Server SSL profile that is configured with a certificate, key, and the SSL Sign Hash set to ANY, and the backend server is enabled with DTLS 1.2 and client authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_carrier-grade_nat f5:big-ip_local_traffic_manager f5:big-ip_ssl_orchestrator f5:big-ip_analytics f5:big-ip_automation_toolchain f5:big-ip_advanced_web_application_firewall f5:big-ip_link_controller f5:big-ip_websafe f5:big-ip_application_acceleration_manager f5:big-ip_fraud_protection_service f5:big-ip_ddos_hybrid_defender f5:big-ip_global_traffic_manager f5:big-ip_application_visibility_and_reporting f5:big-ip_advanced_firewall_manager f5:big-ip_container_ingress_services f5:big-ip_access_policy_manager f5:big-ip_application_security_manager f5:big-ip_policy_enforcement_manager f5:big-ip_webaccelerator f5:big-ip_edge_gateway f5:big-ip_domain_name_system
When a BIG-IP Advanced WAF or ASM security policy is configured with a URL greater than 1024 characters in length for the Data Guard Protection Enforcement setting, either manually or through the automatic Policy Builder, the bd process can terminate repeatedly. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_application_security_manager f5:big-ip_advanced_web_application_firewall
When a BIG-IP Advanced WAF or BIG-IP ASM Security Policy is configured with a JSON content profile that has a malformed JSON schema, and the security policy is applied to a virtual server, undisclosed requests can cause the bd process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_application_security_manager f5:big-ip_advanced_web_application_firewall
When BIG-IP SSL Orchestrator explicit forward proxy is configured on a virtual server and the proxy connect feature is enabled, undisclosed traffic may cause memory corruption. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
When an iRule is configured on a virtual server via the declarative API, upon re-instantiation, the cleanup process can cause an increase in the Traffic Management Microkernel (TMM) memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_next_cloud-native_network_functions f5:big-ip_next_service_proxy_for_kubernetes f5:big-ip_next_for_kubernetes
A validation vulnerability exists in an undisclosed URL in the Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_ssl_orchestrator f5:big-ip_local_traffic_manager f5:big-ip_domain_name_system f5:big-ip_application_visibility_and_reporting f5:big-ip_link_controller f5:big-ip_ddos_hybrid_defender f5:big-ip_application_security_manager f5:big-ip_webaccelerator f5:big-ip_application_acceleration_manager f5:big-ip_automation_toolchain f5:big-ip_websafe f5:big-ip_analytics f5:big-ip_container_ingress_services f5:big-ip_edge_gateway f5:big-ip_advanced_firewall_manager f5:big-ip_access_policy_manager f5:big-ip_policy_enforcement_manager f5:big-ip_fraud_protection_service f5:big-ip_carrier-grade_nat f5:big-ip_advanced_web_application_firewall f5:big-ip_global_traffic_manager
A vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with at least resource administrator role to execute arbitrary system commands with higher privileges. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_ssl_orchestrator f5:big-ip_local_traffic_manager f5:big-ip_domain_name_system f5:big-ip_application_visibility_and_reporting f5:big-ip_link_controller f5:big-ip_ddos_hybrid_defender f5:big-ip_application_security_manager f5:big-ip_webaccelerator f5:big-ip_application_acceleration_manager f5:big-ip_automation_toolchain f5:big-ip_websafe f5:big-ip_analytics f5:big-ip_container_ingress_services f5:big-ip_edge_gateway f5:big-ip_advanced_firewall_manager f5:big-ip_access_policy_manager f5:big-ip_policy_enforcement_manager f5:big-ip_fraud_protection_service f5:big-ip_carrier-grade_nat f5:big-ip_advanced_web_application_firewall f5:big-ip_global_traffic_manager
A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_ssl_orchestrator f5:big-ip_local_traffic_manager f5:big-ip_domain_name_system f5:big-ip_application_visibility_and_reporting f5:big-ip_link_controller f5:big-ip_ddos_hybrid_defender f5:big-ip_application_security_manager f5:big-ip_webaccelerator f5:big-ip_application_acceleration_manager f5:big-ip_automation_toolchain f5:big-ip_websafe f5:big-ip_analytics f5:big-ip_container_ingress_services f5:big-ip_edge_gateway f5:big-ip_advanced_firewall_manager f5:big-ip_access_policy_manager f5:big-ip_policy_enforcement_manager f5:big-ip_fraud_protection_service f5:big-ip_carrier-grade_nat f5:big-ip_advanced_web_application_firewall f5:big-ip_global_traffic_manager
On the BIG-IP system, undisclosed endpoints that contain static non-sensitive information are accessible to an unauthenticated remote attacker through the Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_ssl_orchestrator f5:big-ip_local_traffic_manager f5:big-ip_domain_name_system f5:big-ip_application_visibility_and_reporting f5:big-ip_link_controller f5:big-ip_ddos_hybrid_defender f5:big-ip_application_security_manager f5:big-ip_webaccelerator f5:big-ip_application_acceleration_manager f5:big-ip_automation_toolchain f5:big-ip_websafe f5:big-ip_analytics f5:big-ip_container_ingress_services f5:big-ip_edge_gateway f5:big-ip_advanced_firewall_manager f5:big-ip_access_policy_manager f5:big-ip_policy_enforcement_manager f5:big-ip_fraud_protection_service f5:big-ip_carrier-grade_nat f5:big-ip_advanced_web_application_firewall f5:big-ip_global_traffic_manager
When the database variable tm.tcpudptxchecksum is configured as non-default value Software-only on a BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_ssl_orchestrator f5:big-ip_local_traffic_manager f5:big-ip_domain_name_system f5:big-ip_application_visibility_and_reporting f5:big-ip_link_controller f5:big-ip_ddos_hybrid_defender f5:big-ip_application_security_manager f5:big-ip_webaccelerator f5:big-ip_application_acceleration_manager f5:big-ip_automation_toolchain f5:big-ip_websafe f5:big-ip_analytics f5:big-ip_container_ingress_services f5:big-ip_edge_gateway f5:big-ip_advanced_firewall_manager f5:big-ip_access_policy_manager f5:big-ip_policy_enforcement_manager f5:big-ip_fraud_protection_service f5:big-ip_carrier-grade_nat f5:big-ip_advanced_web_application_firewall f5:big-ip_global_traffic_manager
When a BIG-IP APM OAuth access profile (Resource Server or Resource Client) is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
A directory traversal vulnerability exists in TMUI that allows an authenticated attacker to access files which are not limited to the intended files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
f5:big-ip_ssl_orchestrator f5:big-ip_local_traffic_manager f5:big-ip_domain_name_system f5:big-ip_application_visibility_and_reporting f5:big-ip_link_controller f5:big-ip_ddos_hybrid_defender f5:big-ip_application_security_manager f5:big-ip_webaccelerator f5:big-ip_application_acceleration_manager f5:big-ip_automation_toolchain f5:big-ip_websafe f5:big-ip_analytics f5:big-ip_container_ingress_services f5:big-ip_edge_gateway f5:big-ip_advanced_firewall_manager f5:big-ip_access_policy_manager f5:big-ip_policy_enforcement_manager f5:big-ip_fraud_protection_service f5:big-ip_carrier-grade_nat f5:big-ip_advanced_web_application_firewall f5:big-ip_global_traffic_manager