- Description
- Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
- Source
- f5sirt@f5.com
- NVD status
- Analyzed
- Products
- big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_advanced_web_application_firewall, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_application_visibility_and_reporting, big-ip_automation_toolchain, big-ip_carrier-grade_nat, big-ip_container_ingress_services, big-ip_ddos_hybrid_defender, big-ip_domain_name_system, big-ip_edge_gateway, big-ip_fraud_protection_service, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_ssl_orchestrator, big-ip_webaccelerator, big-ip_websafe
CVSS 4.0
- Type
- Secondary
- Base score
- 8.7
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- f5sirt@f5.com
- CWE-78
- Hype score
- Not currently trending
Simulated CVE-2025-20029 in a safe Docker lab to understand the vuln logic. Minimal Flask app, reproducible flow, no real F5 system. 📎<https://t.co/jM026CE5DB> #CVE #PoC #infosec #CVE_2025_20029 #docker
@schoi1337
10 May 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 ¡Más de 1,000 servidores BIG-IP en México expuestos! (afectando Bancos/GOB/EDU) ⚠️ El CVE-2025-20029 permite escalar privilegios y ejecución remota de comandos. 🔥 ¡PoC recientemente publicada, el riesgo es inminente! 🔍 Hasta el momento se han identificado más de mil… ht
@tpx_Security
1 Mar 2025
474 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
1 Quote
F5 BIG-IPの脆弱性 PoCがリリース(CVE-2025-20029) #セキュリティ対策Lab #セキュリティ #Security https://t.co/3gNjGBcWNa
@securityLab_jp
28 Feb 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20029: Command Injection in F5 BIG-IP, 8.8 rating❗️ The vulnerability allows an attacker to escalate privileges, execute arbitrary commands, Read more.... Search at https://t.co/eIOqQkUaH1: 👉 Link: https://t.co/Z19t91lWH2 #BugBounty #Trending #Cybersecurity https://t.c
@dannyabebe2025
27 Feb 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20029: Command injection of TMSH CLI in F5 BIG-IP https://t.co/qud3n039eq https://t.co/qefJnGvCzv
@freedomhack101
27 Feb 2025
38 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
⚠️⚠️ CVE-2025-20029: Command Injection Flaw Discovered in F5 BIG-IP System, PoC Releases 🎯2.3m+ Results are found on the https://t.co/pb16tGYaKe nearly year. 🔥PoC: https://t.co/OPzh7Q4VXr 🔗FOFA Link:https://t.co/pTLpgAh0HY FOFA Query:app="f5-BIGIP"… https://t.co/gpBJVab3TF
@fofabot
27 Feb 2025
2763 Impressions
16 Retweets
58 Likes
30 Bookmarks
0 Replies
0 Quotes
⚠️ Vulnerability Alert: Command Injection Flaw in F5 BIG-IP System 📅 Timeline: Disclosure: 2025-01-24, Patch: 2025-01-31 🆔cveId: CVE-2025-20029 📊baseScore: 8.8 📏cvssMetrics: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvssSeverity: High 🟠 🛠️exploitMaturity: Proof-of-Concept… h
@syedaquib77
27 Feb 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20029: Command Injection Flaw Discovered in F5 BIG-IP System, PoC Releases https://t.co/iLhD1NFAwu
@Dinosn
27 Feb 2025
7703 Impressions
64 Retweets
163 Likes
45 Bookmarks
1 Reply
0 Quotes
CVE-2025-20029: Command Injection Flaw Discovered in F5 BIG-IP System, PoC Releases Explore CVE-2025-20029, the command injection vulnerability in F5 BIG-IP that affects multiple versions of the system https://t.co/ecSldbYvzT
@the_yellow_fall
27 Feb 2025
2283 Impressions
17 Retweets
43 Likes
15 Bookmarks
0 Replies
0 Quotes
به تازگی برای (TMSH) مربوط به F5 BIG-IP آسیب پذیری با کد شناسایی CVE-2025-20029 از نوع command injection منتشر شده است. این آسیب پذیری به هکرها امکان اجرای کامند با دسترسی پایین و ارتقای سطح دسترسی به یوزر root را می دهد. https://t.co/Poz3aKY03t https://t.co/osCvrPdkwd
@AmirHossein_sec
26 Feb 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20029: Command injection of TMSH CLI in F5 BIG-IP https://t.co/i0SyN3BdBX
@momika233
26 Feb 2025
1088 Impressions
6 Retweets
24 Likes
9 Bookmarks
0 Replies
0 Quotes
F5のBIG-IPに深刻な脆弱性(CVE-2025-20029, CVSS 8.8)が発覚しPoCコードが公開される。iControl REST APIとtmshのコマンド処理の不備により認証済みの攻撃者がroot権限でコマンド実行できる。攻撃者はシェルメタ文字の注入を利用して制限を回避し、バックドア設置や設定改ざんが可能。… https://t.co/kE6GDEzLAW
@yousukezan
25 Feb 2025
1718 Impressions
0 Retweets
10 Likes
6 Bookmarks
0 Replies
1 Quote
CVE-2025-20029 is a command injection vulnerability in F5 BIG-IP's iControl REST, allowing authenticated attackers with low privileges to execute system commands. A PoC demonstrating remote code execution via the 'tmsh' CLI is available on GitHub; https://t.co/VADGa4s9aV
@GrimmAnalyst
24 Feb 2025
67 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
GitHub - mbadanoiu/CVE-2025-20029: CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP - https://t.co/mN57mioFjp
@piedpiper1616
24 Feb 2025
3763 Impressions
34 Retweets
77 Likes
32 Bookmarks
0 Replies
0 Quotes
[CVE-2025-20029: HIGH] Critical command injection vulnerability in iControl REST & BIG-IP TMOS Shell save command can lead to execution of system commands by authenticated attackers. Note: EoTS versions not inclu...#cybersecurity,#vulnerability https://t.co/HfZy9jIPps https:/
@CveFindCom
5 Feb 2025
44 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20029 Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary syst… https://t.co/QGhI906VpN
@CVEnew
5 Feb 2025
171 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ACFA21BC-F3DF-4B8A-995C-9BA6273BA9D9",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "901E1F05-2F2A-44DB-BE01-D0A5A7C05C88",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A912353F-5F09-4DDC-8012-9EB4499B681C",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2645FC28-A376-464F-9F42-8CCAE0C25E2F",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A5D99D9-8C1B-45A7-9396-00B7F6A857D6",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69B6700C-1185-47C0-B670-7CF18A1C252B",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5685C1A6-C0A6-4FDF-921C-45DD543A44B4",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D360E5C-3B0E-4689-A201-64D973CA4F84",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB139E6B-5F2D-4A28-A6E8-16BAF6B5106A",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10AC4FF5-30C6-4145-B55E-2673FB876432",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "173DBEB0-BE14-49B5-83D2-B314DF0FF27E",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F8F56B8-699F-4291-AC52-CC1B6282FE92",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4B04ED6-515F-4A3E-A8D6-A57D2B119694",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2B2B183-7FE2-4CF2-9B7D-B5DDDE451B5F",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C687A8F0-CE1D-42D9-BAB9-6140450802CE",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "473AEA76-D55E-4C89-BD18-84C56C281E6C",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04BCF23C-18DA-4B3B-B88F-07EC8251D2FF",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8822A3-EE6D-4D22-8BAE-845F17CCA039",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A8991DF-96BD-4F1E-9820-C7E8DFE33FE2",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36F8E1BD-67A6-4E9D-BDC7-6993FA83687B",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "267C9729-5DC9-42B6-A860-1C42B97C4C1D",
"versionEndExcluding": "15.1.10.6",
"versionStartIncluding": "15.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42C5261E-CC76-48D7-A5B3-82E01BE49575",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E8F57B7-49CE-4966-B5FD-9BFF59CA754E",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E754CA-395B-45F7-BFC1-2AA92AD02BE5",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "169502B9-8E6A-4981-AA07-B51331119908",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A37F8C-E0B4-42B2-A30E-870C31BFB98D",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45379A02-10A9-4198-A9D5-6E8C4E01AF3E",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B99204C1-A38F-46CD-A104-E22D9F47FA81",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB9B1EB5-9BBD-45C4-B13A-DC03F9B3E585",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0A7A2AE-272A-4EBD-8AB4-493031710455",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBFE962-2924-4E21-8E66-4E6C8A2A7CE5",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "083B09EA-C864-4784-9B63-2FAF3F4FBCED",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC440F57-771F-4A96-9792-873DBBF6B71D",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70014BBC-95C8-4873-A5AD-13C0CEB084AF",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB30B472-660B-456D-AA9D-6FE0A7004DB2",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "498EC9EE-189C-4A89-AA67-5709F9FA47C3",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34211472-272D-4D17-A8D7-E3C89EA3A042",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4E30D9-6076-4560-8B29-1B4ED07D72B5",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19ED7787-AEC0-45A2-A187-2BC164D9B046",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86330C47-96F4-4732-8179-F5275D8A4105",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44AC4540-A25B-47E5-8501-CA2B992BDED0",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28A713E8-597F-41D1-8F72-86729DDF4D56",
"versionEndExcluding": "16.1.5.2",
"versionStartIncluding": "16.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CA138F-8EE1-40ED-98BD-509C687E8F8F",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8076A80-5BFB-478A-84D9-BD7CD84AE2FE",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1543EE-6B7F-469E-A378-D2434AE86406",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC9EFBCC-3996-4BCA-9C2A-E37084FE12E8",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BADF783-875B-4685-96C5-DD280A661157",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "651C7CEE-A962-4771-920E-E6FA13E6817A",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B102BA6-EB21-40DE-8939-BA4B2D5A3B9F",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA7DFCC2-9953-48FC-9BDB-13A8EC34228A",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CBE8218F-C290-43A2-AC0B-3416A1850088",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C92188C5-1230-4030-B384-F28E222CD7AE",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A2D4DBD-A2FE-4F17-B64A-A66BC98801BB",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "794082F4-A86E-49EF-9B8D-684E568F0527",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0A2560-601C-4A90-93AE-CB99F4CC38B7",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EBCA2AF-BF51-46CB-B2A1-E539C8938237",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "002D9868-FEA3-424B-BEB6-41510F4B46C8",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDEBA67-6390-4A05-96F7-134B0FB5A089",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC1A913-2B13-4C38-806F-96DFB6231C32",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B786F7D8-AF15-4CD2-9ED3-3C0510585D1B",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49B8B566-B34A-45C3-A188-7F7DF8D1F898",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE937E15-FC55-4369-9C88-AA847F18EFB0",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABED562C-83CB-4A34-B2F9-706E7CB9E923",
"versionEndExcluding": "17.1.2.1",
"versionStartIncluding": "17.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]