Vulnerabilities > F5 > BIG IP Advanced WEB Application Firewall > Medium

DATE CVE VULNERABILITY TITLE RISK
2020-11-05 CVE-2020-5943 Use of a Broken or Risky Cryptographic Algorithm vulnerability in F5 products
In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does.
network
low complexity
f5 CWE-327
6.5
2020-10-29 CVE-2020-5938 Inadequate Encryption Strength vulnerability in F5 products
On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow.
network
low complexity
f5 CWE-326
6.5
2020-09-25 CVE-2020-5929 Information Exposure Through Discrepancy vulnerability in F5 products
In versions 13.0.0-13.0.0 HF2, 12.1.0-12.1.2 HF1, and 11.6.1-11.6.2, BIG-IP platforms with Cavium Nitrox SSL hardware acceleration cards, a Virtual Server configured with a Client SSL profile, and using Anonymous (ADH) or Ephemeral (DHE) Diffie-Hellman key exchange and Single DH use option not enabled in the options list may be vulnerable to crafted SSL/TLS Handshakes that may result with a PMS (Pre-Master Secret) that starts in a 0 byte and may lead to a recovery of plaintext messages as BIG-IP TLS/SSL ADH/DHE sends different error messages acting as an oracle.
network
high complexity
f5 CWE-203
5.9