F5 Networks Big Ip Next Service Proxy Kubernetes
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in F5 Networks Big Ip Next Service Proxy Kubernetes.
By the Year
In 2026 there have been 0 vulnerabilities in F5 Networks Big Ip Next Service Proxy Kubernetes. Last year, in 2025 Big Ip Next Service Proxy Kubernetes had 1 security vulnerability published. Right now, Big Ip Next Service Proxy Kubernetes is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 0.00 |
| 2024 | 2 | 7.50 |
| 2023 | 5 | 7.04 |
It may take a day or so for new Big Ip Next Service Proxy Kubernetes vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent F5 Networks Big Ip Next Service Proxy Kubernetes Security Vulnerabilities
F5 BIG-IP: TMM Crash via HTTP Enforce RFC Requests
CVE-2025-36557
- May 07, 2025
When an HTTP profile with the Enforce RFC Compliance option is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Classic Buffer Overflow
Fatal Crash in F5 BIG-IP Virtual Server with MPTCP Enabled
CVE-2024-41164
7.5 - High
- August 14, 2024
When TCP profile with Multipath TCP enabled (MPTCP) is configured on a Virtual Server, undisclosed traffic along with conditions beyond the attackers control can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
NULL Pointer Dereference
HTTP/2 Undisclosed Response Causes TMM Crash in F5 BIG-IP
CVE-2024-23314
7.5 - High
- February 14, 2024
When HTTP/2 is configured on BIG-IP or BIG-IP Next SPK systems, undisclosed responses can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
DoS via Malformed BGP Attribute in IP Infusion ZebOS bgpd <=7.10.6
CVE-2023-45886
7.5 - High
- November 21, 2023
The BGP daemon (bgpd) in IP Infusion ZebOS through 7.10.6 allow remote attackers to cause a denial of service by sending crafted BGP update messages containing a malformed attribute.
HTTP/2 DoS via Stream Reset in nginx
CVE-2023-44487
7.5 - High
- October 10, 2023
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Resource Exhaustion
BIG-IP SPK TMM Hardcoded Credentials in Debug SSH Containers
CVE-2023-45226
7.4 - High
- October 10, 2023
The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Use of Hard-coded Credentials
F5 BIG-IP TMM Crash via Client HTTP/2 + MRF Router iRule Fusion
CVE-2023-40534
7.5 - High
- October 10, 2023
When a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, and an iRule using the HTTP_REQUEST event or Local Traffic Policy are associated with the virtual server, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Memory Leak
F5 BIG-IP SSL Profile CPU Exhaustion via Undisclosed Traffic
CVE-2023-24594
5.3 - Medium
- May 03, 2023
When an SSL profile is configured on a Virtual Server, undisclosed traffic can cause an increase in CPU or SSL accelerator resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Resource Exhaustion
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for F5 Networks Big Ip Next Service Proxy Kubernetes or by F5 Networks? Click the Watch button to subscribe.