
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was identified in BIG-IP and BIG-IQ systems affecting multiple versions (BIG-IP 15.0.0-15.1.0.2, 14.1.0-14.1.2.3, 13.1.0-13.1.3.2, 12.1.0-12.1.5.1, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0). The vulnerability exists in the High Availability (HA) network failover functionality within Device Service Cluster (DSC) (F5 Advisory).
The vulnerability stems from two main issues in the failover service: lack of strong authentication requirements and unencrypted network failover traffic. Specifically, the High Availability network failover in Device Service Cluster does not implement proper authentication mechanisms, and the traffic is transmitted without Transport Layer Security (TLS) encryption (F5 Advisory).
The absence of strong authentication and encryption in the failover service could potentially allow attackers to intercept or manipulate HA network failover traffic, potentially affecting the availability and security of the BIG-IP and BIG-IQ systems (F5 Advisory).
F5 has addressed this vulnerability through security updates. Users are advised to upgrade to patched versions of the affected software. The specific upgrade paths and fixed versions are detailed in the F5 security advisory (F5 Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."