F5 Networks
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any F5 Networks product.
RSS Feeds for F5 Networks security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in F5 Networks products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by F5 Networks Sorted by Most Security Vulnerabilities since 2018
Recent F5 Networks Security Advisories
| Advisory | Title | Published |
|---|---|---|
| K000161278 | K000161278: Spring Cloud vulnerability CVE-2026-22739 | May 14, 2026 |
| K000161273 | K000161273: MySQL vulnerabilities CVE-2026-34317, CVE-2026-34318 and CVE-2026-34319 | May 14, 2026 |
| K000161272 | K000161272: Spring Security vulnerability CVE-2026-22753 | May 14, 2026 |
| K000160932 | K000160932: Quarterly Security Notification (May 2026) | May 14, 2026 |
| K000161266 | K000161266: Node.js vulnerability CVE-2025-23166 | May 14, 2026 |
| K000160979 | K000160979: BIG-IP iControl SOAP vulnerability CVE-2026-40631 | May 13, 2026 |
| K000160971 | K000160971: BIG-IP and BIG-IQ privilege escalation vulnerability CVE-2026-42406 | May 13, 2026 |
| K000160981 | K000160981: iControl REST and tmsh vulnerability CVE-2026-40698 | May 13, 2026 |
| K000160972 | K000160972: BIG-IP and BIG-IQ privilege escalation vulnerability CVE-2026-32643 | May 13, 2026 |
| K000160975 | K000160975: BIG-IP privilege escalation vulnerability CVE-2026-41953 | May 13, 2026 |
Known Exploited F5 Networks Vulnerabilities
The following F5 Networks vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| F5 BIG-IP Unspecified Vulnerability |
F5 BIG-IP APM contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution. CVE-2025-53521 Exploit Probability: 7.5% |
March 27, 2026 |
| F5 BIG-IP Configuration Utility SQL Injection Vulnerability |
F5 BIG-IP Configuration utility contains an SQL injection vulnerability that may allow an authenticated attacker with network access through the BIG-IP management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46747. CVE-2023-46748 Exploit Probability: 4.3% |
October 31, 2023 |
| F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability |
F5 BIG-IP Configuration utility contains an authentication bypass using an alternate path or channel vulnerability due to undisclosed requests that may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46748. CVE-2023-46747 Exploit Probability: 94.4% |
October 31, 2023 |
| F5 BIG-IP Missing Authentication Vulnerability |
F5 BIG-IP contains a missing authentication in critical function vulnerability which can allow for remote code execution, creation or deletion of files, or disabling services. CVE-2022-1388 Exploit Probability: 94.5% |
May 10, 2022 |
| F5 BIG-IP Traffic Management Microkernel Buffer Overflow |
The Traffic Management Microkernel of BIG-IP ASM Risk Engine has a buffer overflow vulnerability, leading to a bypassing of URL-based access controls. CVE-2021-22991 Exploit Probability: 73.1% |
January 18, 2022 |
| F5 BIG-IP Traffic Management User Interface Remote Code Execution Vulnerability |
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages. CVE-2020-5902 Exploit Probability: 94.4% |
November 3, 2021 |
| F5 iControl REST unauthenticated Remote Code Execution Vulnerability |
The iControl REST interface has an unauthenticated remote command execution vulnerability. CVE-2021-22986 Exploit Probability: 94.5% |
November 3, 2021 |
Of the known exploited vulnerabilities above, 4 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings. The vulnerability CVE-2021-22991: F5 BIG-IP Traffic Management Microkernel Buffer Overflow is in the top 5% of the currently known exploitable vulnerabilities.
By the Year
In 2026 there have been 122 vulnerabilities in F5 Networks with an average score of 6.9 out of ten. Last year, in 2025 F5 Networks had 356 security vulnerabilities published. Right now, F5 Networks is on track to have less security vulnerabilities in 2026 than it did last year. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.01.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 122 | 6.90 |
| 2025 | 356 | 6.89 |
| 2024 | 345 | 6.46 |
| 2023 | 177 | 7.00 |
| 2022 | 405 | 7.04 |
| 2021 | 327 | 7.23 |
| 2020 | 263 | 6.63 |
| 2019 | 303 | 6.75 |
| 2018 | 216 | 7.03 |
It may take a day or so for new F5 Networks vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent F5 Networks Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-42926 | May 13, 2026 |
NGINX HTTP/2 Proxy Body Injection VulnerabilityWhen NGINX Open Source is configured to proxy HTTP/2 traffic by setting proxy_http_version to 2, and also uses proxy_set_body, an attacker may be able to inject frame headers and payload bytes to the upstream peer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42946 | May 13, 2026 |
NGINX SCGI/UWSGI Modules Excessive Memory Allocation via MITMA vulnerability exists in the ngx_http_scgi_module and ngx_http_uwsgi_module modules that may result in excessive memory allocation or an over-read of data. When scgi_pass or uwsgi_pass is configured, an unauthenticated attacker with man-in-the-middle (MITM) ability to control responses from an upstream server may be able to read the memory of the NGINX worker process or restart it. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40460 | May 13, 2026 |
NGINX HTTP/3 QUIC IP Spoofing for Auth / Rate Limiting BypassWhen NGINX Plus or NGINX Open Source are configured to use the HTTP/3 QUIC module, an attacker may be able to spoof their source IP address allowing for bypass of authorization or bypass of rate limiting. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42945 | May 13, 2026 |
Heap Buffer Overflow in NGINX ngx_http_rewrite_module via PCRE CaptureNGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42934 | May 13, 2026 |
NGINX ngx_http_charset_module Heap Buffer Over-read in Worker ProcessNGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_charset_module module. When charset, source_charset, and charset_map and proxy_pass with disabled buffering ("off") directives are configured, unauthenticated attackers can send requests that with conditions beyond the attackers' control to cause a heap buffer over-read in the NGINX worker process, leading to limited disclosure of memory or a restart. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40701 | May 13, 2026 |
NGINX Heap UAF via ssl_verify_client/ssl_ocsp in ngx_http_ssl_moduleNGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_ssl_module module when the ssl_verify_client directive is set to "on" or "optional," and the ssl_ocsp directive is set to "on" or the leaf parameters are configured with a resolver. With this configuration, an unauthenticated attacker can send requests along with conditions beyond its control that may cause a heap-use-after-free error in the NGINX worker process. This vulnerability may result in limited modification of data or the NGINX worker process restarting. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-24464 | May 13, 2026 |
Dir Traversal in F5 iControl REST Allows File DeletionWhen running in Appliance mode, a directory traversal vulnerability exists in an undisclosed iControl REST endpoint that may allow an authenticated attacker with administrator role privileges to cross a security boundary and delete files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40423 | May 13, 2026 |
F5 BIG-IP TMM Crash via Undisclosed SIP Traffic (CVE-2026-40423)When a SIP profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42930 | May 13, 2026 |
CVE-2026-42930: BIG-IP Admin role bypasses Appliance ModeWhen running in Appliance mode, an authenticated attacker assigned the 'Administrator' role may be able to bypass Appliance mode restrictions on a BIG-IP system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-41959 | May 13, 2026 |
F5 BIG-IP BIG-IQ TMOS Shell Permissions Leak Network StatusIncorrect permission assignment vulnerabilities exist in BIG-IP and BIG-IQ TMOS Shell (tmsh) network diagnostics commands and in BIG-IP iControl REST. These vulnerabilities may allow an authenticated attacker to view the network status of destination systems. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-39458 | May 13, 2026 |
F5 BIGIP TMM Crash via DNS Cache on Virtual ServerWhen a BIG-IP DNS profile enabled with DNS cache is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42058 | May 13, 2026 |
Authenticated iControl REST Leak in F5 BIG-IP Local UsersAn authenticated attacker's undisclosed requests to BIG-IP iControl REST can lead to an information leak of BIG-IP local user account names. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-32643 | May 13, 2026 |
Auth Bypass in F5 BIGIP allows Config Mod for Arbitrary Code ExecA vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running arbitrary commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42406 | May 13, 2026 |
F5 BIG-IP / BIG-IQ Authenticated Cmd Injection via Cert Mngr RoleA vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running arbitrary commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42937 | May 13, 2026 |
F5 BIG-IP tmsh arp/ndp PrivEsc Exposing Adjacent Net InfoIncorrect permission assignment vulnerabilities exist in BIG-IP and BIG-IQ TMOS Shell (tmsh) arp and ndp commands, and in BIG-IP iControl REST. These vulnerabilities may allow an authenticated attacker to view adjacent network information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-39455 | May 13, 2026 |
F5 BIG-IP LDAP Auth Causes httpd FD ExhaustionWhen the BIG-IP Configuration utility is configured to use Lightweight Directory Access Protocol (LDAP) authentication, undisclosed traffic can cause the httpd process to exhaust the available file descriptors. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-41217 | May 13, 2026 |
BIG-IP TMOS TMSH Command RCE with Escalated PrivilegesA vulnerability exists in an undisclosed BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with resource administrator or administrator role to execute arbitrary system commands with higher privileges. In Appliance mode deployments, a successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-34176 | May 13, 2026 |
Authenticated Remote Cmd Injection in F5 iControl RESTWhen running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-32673 | May 13, 2026 |
BIG-IP Scripted Monitors Exec Arbitrary Cmd & Cross Security BoundaryA vulnerability exists in BIG-IP scripted monitors that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system commands with higher privileges. In appliance mode deployments, a successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-41225 | May 13, 2026 |
Arbitrary Cmd Exec in F5 BIG-IP iControl RESTA vulnerability exists in iControl REST where a highly privileged, authenticated attacker with at least the Manager role can create configuration objects that allow running arbitrary commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-39459 | May 13, 2026 |
Arbitrary Cmd Exec via Privileged Role in F5 BIG-IP iControl REST/TMOS ShellA vulnerability exists in iControl REST and the TMOS Shell (tmsh) where a highly privileged, authenticated attacker with at least the Manager role can create configuration objects that allow running arbitrary commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42063 | May 13, 2026 |
Auth Res Admin Can Download Sensitive Files via iControl SOAPA vulnerability exists in iControl SOAP where an authenticated attacker with the Resource Administrator or Administrator role can download sensitive files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-41953 | May 13, 2026 |
Big-IP Resource Admin Privilege Escalation via Config ModA vulnerability exists in BIG-IP systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can modify configuration objects resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40698 | May 13, 2026 |
PrivEsc via SNMP Config Creation on F5 BIG-IP/BIG-IQA vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can create SNMP configuration objects through iControl REST or the TMOS shell (tmsh) resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40631 | May 13, 2026 |
Privilege Escalation via iControl SOAP in F5 BIG-IPAn authenticated attacker with the Resource Administrator or Administrator role can modify configuration objects through iControl SOAP resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40060 | May 13, 2026 |
F5 BIGIP WAF Crash: bd Process Terminates via Undisclosed RequestsWhen a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42924 | May 13, 2026 |
Priv Escalation via iControl SOAP SNMP Config Create in F5 BIG-IPAn authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-41227 | May 13, 2026 |
F5 BIG-IP HTTP/2 L7 DoS Protection causes TMM memory exhaustionOn an HTTP/2 virtual server with Layer 7 DoS Protection configured, undisclosed traffic can result in an increase in memory consumption causing the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40061 | May 13, 2026 |
Auth PLE in F5 BIG-IP DNS via iControl REST/TM ShellWhen BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system commands with higher privileges. In Appliance mode deployments, a successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42409 | May 13, 2026 |
DoS via HTTP::redirect/HTTP::respond iRule on F5 BIG-IP TMMWhen an HTTP/2 profile and an iRule containing the HTTP::redirect or HTTP::respond command are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40618 | May 13, 2026 |
SSL Profile Misconfig Causes TMM Crash on F5 BIG-IP VE/hardwareWhen an SSL profile is configured on a virtual server on BIG-IP Virtual Edition (VE) without Intel QuickAssist Technology (QAT) or on BIG-IP hardware platforms with the database variable crypto.hwacceleration set to disabled, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-41956 | May 13, 2026 |
TMM Crash on F5 BIG-IP UDP Virtual Server via Undisclosed RequestsWhen a classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-35062 | May 13, 2026 |
BIG-IP iControl SOAP Auth User Can Get Other Accounts (CVE-2026-35062)An authenticated iControl SOAP user may be able to obtain information of other accounts. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40629 | May 13, 2026 |
F5 BIGIP SSL Profile Bug Undisclosed Traffic Blocks New ConnectionsWhen SSL profiles are configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing new client connections. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42920 | May 13, 2026 |
F5 BIG-IP TMM Crash via Dynamic RecFmt on UDP SSLWhen a Client SSL profile is configured with Allow Dynamic Record Sizing on a UDP virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42781 | May 13, 2026 |
ePVA Resource Exhaustion via Local Ethernet Traffic (F5 BIG-IP)When embedded Packet Velocity Acceleration (ePVA) acceleration is configured, undisclosed local ethernet traffic can cause an increase in ePVA and Traffic Management Microkernel (TMM) resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42919 | May 13, 2026 |
BIG-IP Priv Escalation via Authenticated Admin (CVE-2026-42919)A vulnerability exists in BIG-IP systems that may allow an authenticated attacker with administrative access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-41218 | May 13, 2026 |
F5 BIG-IP TMM Crash via PEM iRules exploitationWhen BIG-IP PEM iRules are configured on a virtual server (iRules using commands starting with CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, and the urlcatquery command), undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-20916 | May 13, 2026 |
Authenticated iControl REST File Write on BIGIQAn authenticated iControl REST user with low privileges can create or modify arbitrary files through an undisclosed iControl REST endpoint on the BIG-IQ system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42408 | May 13, 2026 |
Privileged Auth Info Disclosure via Hidden TMOS Shell Cmd in BIGIP DNSWhen BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed TMOS Shell (tmsh) command that may allow a highly privileged authenticated attacker to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-41957 | May 13, 2026 |
Auth RCE in F5 BIG-IP/BIG-IQ Configuration UtilityAn authenticated remote code execution vulnerability through undisclosed vectors exists in the BIG-IP and BIG-IQ Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-34019 | May 13, 2026 |
BFD Vulnerability in F5 BIG-IP TMM Leads to Routing FailoverWhen Bidirectional Forwarding Detection (BFD) is configured in Static and Dynamic routing protocols, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to stop processing BFD packets and cause the configured routing protocol to fail over. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40699 | May 13, 2026 |
Auth Bypass in F5 BIG-IP Config UIA vulnerability exists in the undisclosed pages in the Configuration utility that may allow a low-privileged authenticated attacker to access to undisclosed sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40067 | May 13, 2026 |
apmd Crash via Undisclosed Traffic in BIG-IP APM Access PolicyWhen a BIG-IP APM access policy is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-42780 | May 13, 2026 |
F5 BIG-IP SSL Orchestrator Directory Traversal CVE-2026-42780A directory traversal vulnerability exists in BIG-IP SSL Orchestrator that allows an authenticated attacker with high privilege to overwrite, delete or corrupt arbitrary local files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-41219 | May 13, 2026 |
F5 BIG-IP QKView Improper Sanitization LeakAn improper sanitization vulnerability exists in the BIG-IP QKView utility that allows a low-privileged attacker to read sensitive information from a QKView file. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated |
|
| CVE-2026-28758 | May 13, 2026 |
F5 BIG-IP DNS gtm_add Returns SSH-Password in Cleartext via iControl RESTWhen BIG-IP DNS is provisioned, a vulnerability exists in the gtm_add and bigip_add iControl REST commands that return the ssh-password parameter in cleartext in the iControl REST response and is also logged in the audit log. This may allow a highly privileged, authenticated attacker with access to the audit log to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated |
|
| CVE-2026-41954 | May 13, 2026 |
F5 BIG-IP iControl REST/TMSH Authenticated Info DisclosureSensitive information disclosure vulnerability exists in the undisclosed iControl REST endpoint and TMOS Shell (tmsh) command which may allow an authenticated attacker with resource administrator role privileges to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40462 | May 13, 2026 |
F5 BIG-IP iControl REST Shell Permission Bypass (CVE202640462)Incorrect permission assignment vulnerabilities exist in iControl REST and TMOS shell (tmsh) undisclosed command which may allow an authenticated attacker to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|
| CVE-2026-40703 | May 13, 2026 |
BIG-IP Config UI CSRF in DashboardA cross-site request forgery (CSRF) vulnerability exists in the dashboard of the BIG-IP Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
|