|
1481
|
8.8 |
HIGH
Network
|
-
|
-
|
An authenticated remote code execution vulnerability through undisclosed vectors exists in the BIG-IP and BIG-IQ Configuration utility.
Note: Software versions which have reached End of Technical S…
|
CWE-502
Deserialization of Untrusted Data
|
CVE-2026-41957
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1482
|
6.5 |
MEDIUM
Local
|
-
|
-
|
Incorrect permission assignment vulnerabilities exist in BIG-IP and BIG-IQ TMOS Shell (tmsh) network diagnostics commands and in BIG-IP iControl REST. These vulnerabilities may allow an authenticated…
|
CWE-732
Incorrect Permission Assignment for Critical Resource
|
CVE-2026-41959
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1483
|
4.3 |
MEDIUM
Network
|
-
|
-
|
An authenticated attacker's undisclosed requests to BIG-IP iControl REST can lead to an information leak of BIG-IP local user account names. Note: Software versions which have reached End of Technic…
|
CWE-732
Incorrect Permission Assignment for Critical Resource
|
CVE-2026-42058
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1484
|
4.9 |
MEDIUM
Network
|
-
|
-
|
A vulnerability exists in iControl SOAP where an authenticated attacker with the Resource Administrator or Administrator role can download sensitive files. Note: Software versions which have reached…
|
CWE-552
Files or Directories Accessible to External Parties
|
CVE-2026-42063
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1485
|
8.7 |
HIGH
Network
|
-
|
-
|
A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running ar…
|
CWE-267
Privilege Defined With Unsafe Actions
|
CVE-2026-42406
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1486
|
4.4 |
MEDIUM
Local
|
-
|
-
|
When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed TMOS Shell (tmsh) command that may allow a highly privileged authenticated attacker to view sensitive information. Note: Soft…
|
CWE-312
Cleartext Storage of Sensitive Information
|
CVE-2026-42408
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1487
|
7.5 |
HIGH
Network
|
-
|
-
|
When an HTTP/2 profile and an iRule containing the HTTP::redirect or HTTP::respond command are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) …
|
CWE-476
NULL Pointer Dereference
|
CVE-2026-42409
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1488
|
4.9 |
MEDIUM
Network
|
-
|
-
|
A directory traversal vulnerability exists in BIG-IP SSL Orchestrator that allows an authenticated attacker with high privilege to overwrite, delete or corrupt arbitrary local files.
Note: Software …
|
CWE-22
Path Traversal
|
CVE-2026-42780
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1489
|
6.5 |
MEDIUM
Adjacent
|
-
|
-
|
When embedded Packet Velocity Acceleration (ePVA) acceleration is configured, undisclosed local ethernet traffic can cause an increase in ePVA and Traffic Management Microkernel (TMM) resource utiliz…
|
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
|
CVE-2026-42781
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1490
|
6.7 |
MEDIUM
Network
|
-
|
-
|
A vulnerability exists in BIG-IP systems that may allow an authenticated attacker with administrative access to escalate their privileges. A successful exploit may allow the attacker to cross a secur…
|
CWE-121
Stack-based Buffer Overflow
|
CVE-2026-42919
|
2026-05-14 01:27 |
2026-05-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|