Vulnerabilities > F5 > BIG IP Access Policy Manager
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-12-28 | CVE-2018-15335 | Unspecified vulnerability in F5 Big-Ip Access Policy Manager When APM 13.0.0-13.1.x is deployed as an OAuth Resource Server, APM becomes a client application to an external OAuth authorization server. | 5.9 |
2018-12-28 | CVE-2018-15334 | Cross-Site Request Forgery (CSRF) vulnerability in F5 Big-Ip Access Policy Manager A cross-site request forgery (CSRF) vulnerability in the APM webtop 11.2.1 or greater may allow attacker to force an APM webtop session to log out and require re-authentication. | 4.3 |
2018-12-28 | CVE-2018-15333 | Unrestricted Upload of File with Dangerous Type vulnerability in F5 products On versions 11.2.1. | 5.5 |
2018-12-20 | CVE-2018-15330 | Improper Input Validation vulnerability in F5 products On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, or 12.1.0-12.1.3.7, when a virtual server using the inflate functionality to process a gzip bomb as a payload, the BIG-IP system will experience a fatal error and may cause the Traffic Management Microkernel (TMM) to produce a core file. | 7.5 |
2018-12-20 | CVE-2018-15329 | Missing Authorization vulnerability in F5 products On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, or 12.1.0-12.1.3.7, or Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced. | 7.2 |
2018-12-12 | CVE-2018-15328 | Information Exposure vulnerability in F5 products On BIG-IP 14.0.x, 13.x, 12.x, and 11.x, Enterprise Manager 3.1.1, BIG-IQ 6.x, 5.x, and 4.x, and iWorkflow 2.x, the passphrases for SNMPv3 users and trap destinations that are used for authentication and privacy are not handled by the BIG-IP system Secure Vault feature; they are written in the clear to the various configuration files. | 7.5 |
2018-12-06 | CVE-2018-15332 | Race Condition vulnerability in F5 Big-Ip Access Policy Manager The svpn component of the F5 BIG-IP APM client prior to version 7.1.7.2 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host in a race condition. | 7.0 |
2018-10-31 | CVE-2018-15327 | Missing Authorization vulnerability in F5 products In BIG-IP 14.0.0-14.0.0.2 or 13.0.0-13.1.1.1 or Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced. | 7.2 |
2018-10-31 | CVE-2018-15326 | Improper Certificate Validation vulnerability in F5 Big-Ip Access Policy Manager In some situations on BIG-IP APM 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, or 11.6.0-11.6.3.2, the CRLDP Auth access policy agent may treat revoked certificates as valid when the BIG-IP APM system fails to download a new Certificate Revocation List. | 7.5 |
2018-10-31 | CVE-2018-15325 | Resource Exhaustion vulnerability in F5 products In BIG-IP 14.0.0-14.0.0.2 or 13.0.0-13.1.1.1, iControl and TMSH usage by authenticated users may leak a small amount of memory when executing commands | 4.3 |