- Description
- When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
- Source
- f5sirt@f5.com
- NVD status
- Analyzed
- Products
- big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_advanced_web_application_firewall, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_application_visibility_and_reporting, big-ip_automation_toolchain, big-ip_carrier-grade_nat, big-ip_container_ingress_services, big-ip_ddos_hybrid_defender, big-ip_domain_name_system, big-ip_edge_gateway, big-ip_fraud_protection_service, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_ssl_orchestrator, big-ip_webaccelerator, big-ip_websafe
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- f5sirt@f5.com
- CWE-770
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
28
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation https://t.co/2sF4DZzB2a #neuco
@neucogroup
29 Mar 2026
22 Impressions
2 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation https://t.co/s9w27BVzP5
@DeepBlueInfoSec
29 Mar 2026
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA warns of active exploitation of F5 BIG-IP vulnerability CVE-2025-53521. Organizations urged to apply patches immediately to prevent potential breaches. Link: https://t.co/cFP2aA2tR3 #Security #Vulnerability #Exploitation #Mitigation #Patch #Breach #CISA #Technology #Network
@dailytechonx
29 Mar 2026
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Urges Immediate Action on CVE-2025-53521 Following Active Exploitation https://t.co/9UiCvD8RC5 #CISA #cybersecurity #vulnerability #exploitation #threat #security #CVE #protection #alert #hacking #network #breach #IT #technology #risk #safety #mitigation #attack #response
@dailytechonx
29 Mar 2026
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA added CVE-2025-53521 in F5 BIG-IP APM to KEV with a short remediation clock. For local governments, that makes this a same-day perimeter risk decision—not routine patch debt. Confirm exposure, patch status, and ownership now. https://t.co/8TqOzJeiql
@Cyb3r_Leo
29 Mar 2026
50 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
Intel Report [CRITICAL] - A critical unauthenticated remote code execution vulnerability (CVE-2025-53521) in F5 BIG-IP Access Policy Manager (APM) is under active exploitation, prompting CISA to add it to the Known Exploited Vulnerabilities (KEV)... https://t.co/lQiYBepMPz
@EnigmaGlobalSW
29 Mar 2026
55 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation https://t.co/GZBaQVxeSG
@JedisecX
29 Mar 2026
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SMBs, a quick heads-up: F5 BIG-IP has an actively exploited vulnerability (CVE-2025-53521) now in KEV. Check if your gateways are exposed, apply patches, and watch for unusual traffic. Don’t wait for a breach—prep your patch window. Details: https://t.co/CYRgvFMOjm
@StrongKeepCyber
29 Mar 2026
69 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2020-5902 2 - CVE-2026-33634 3 - CVE-2025-31277 4 - CVE-2026-20643 5 - CVE-2025-53521 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
29 Mar 2026
99 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation https://t.co/080GKrWtWB
@PVynckier
29 Mar 2026
121 Impressions
3 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[0-DAY] THE BRICKSTORM BREACH: CVSS 9.8 RCE (CVE-2025-53521) https://t.co/RRuROEYtIt https://t.co/B0OTFY0MtO
@invasive_labs
29 Mar 2026
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds F5 BIG-IP RCE (CVE-2025-53521) to its KEV Catalog. With a 9.8 CVSS score and active exploits, federal agencies must patch by March 30, 2026. #F5 #BIGIP #CyberSecurity #InfoSec #RCE #CISA #PatchAlert #Vulnerability #NetworkSecurity #CVE https://t.co/s05axhTOQH https://t
@the_yellow_fall
29 Mar 2026
911 Impressions
4 Retweets
18 Likes
8 Bookmarks
0 Replies
1 Quote
SMBs, take note: attackers are already exploiting CVE-2025-53521 in F5 BIG-IP APM. Patch now, verify access controls, and monitor logs for odd activity. Don’t panic—just patch, segment, and review your gateway exposure. Read more: https://t.co/yyVg3Weepb
@StrongKeepCyber
29 Mar 2026
93 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CISA adds CVE-2025-53521 (F5 BIG-IP APM, CVSS 9.3) to KEV catalog due to active exploitation. It allows remote code execution—urgent patch recommended! #cybersecurity https://t.co/AphuGHzVsx
@technoholic_me
29 Mar 2026
89 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ CISA KEV ALERT: CVE-2025-53521 in F5 BIG-IP APM just added to the Known Exploited Vulnerabilities catalog. CVSS 9.3 | Remote Code Execution | No user interaction required. If you're running BIG-IP APM — patch timeline was yesterday. #CISA #F5 #RCE #InfoSec #CyberSecur
@isectech_
28 Mar 2026
124 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
TRC analysis shows attackers exploiting CVE-2025-53521 in F5 BIG-IP APM to terminate critical Traffic Management processes without authentication. Post-compromise activity includes lateral movement and C2 establishment. Runtime segmentation helps contain breach chains after
@aviatrixtrc
28 Mar 2026
125 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in Attacks - Cyber Security News https://t.co/MciRWe6e90 "The vulnerability, tracked as CVE-2025-53521, was officially listed on March 27, 2026, with a remediation deadline of March 30, 2026, for federal agencies."
@catnap707
28 Mar 2026
255 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation https://t.co/NLEs9X7h93
@TechNowPulse
28 Mar 2026
116 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
#CISA Adds CVE-2025-53521 to #KEV After Active F5 BIG-IP #APM #Exploitation https://t.co/k74fJ8EUom https://t.co/dewhczlTm3
@omvapt
28 Mar 2026
109 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation https://t.co/5iyfc2FPH8
@Hackervidya
28 Mar 2026
96 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 F5 BIG-IP APM RCE (CVE-2025-53521): Actively exploited auth bypass + code exec on access proxies. Hits enterprise networks hard—CISA adds to KEV, urgent patching needed. https://t.co/huymlNaCBy
@TheRabbitPy
28 Mar 2026
121 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
TRC analysis shows attackers exploiting CVE-2025-53521 to crash F5 BIG-IP's Traffic Management Microkernel, creating DoS conditions that enable privilege escalation and lateral movement. Runtime segmentation helps contain post-compromise activity when APM systems fail. #ZeroTrust
@aviatrixtrc
28 Mar 2026
100 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 **تنبيه أمني عاجل لمستخدمي أنظمة F5 BIG-IP** أصدرت وكالة الأمن السيبراني وأمن البنية التحتية الأمريكية (CISA) تحذيرًا عالي الخطورة بشأن ثغرة أمنية مكتشفة حدي
@cyber_shockry
28 Mar 2026
99 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation https://t.co/vTzUvIM1xb via @TheHackersNews
@ABabino
28 Mar 2026
87 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[BREAKING] CISA adds F5 BIG-IP CVE-2025-53521 to KEV catalog after confirming active exploitation on March 27, 2026 CISA on March 27, 2026, added CVE-2025-53521—a critical remote code execution flaw in F5 BIG-IP Access Policy Manager—to its Known Exploited Vulnerabilities h
@DarkForgeNews
28 Mar 2026
90 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISAがCVE-2025-53521をKEVに追加し悪用が確認、重要なのは既に実際の攻撃で利用されている脆弱性として優先対応が必要な点 この脆弱性は実環境での悪用が観測され、政府機関や組織に対し期限付きでのパッチ
@01ra66it
28 Mar 2026
472 Impressions
0 Retweets
4 Likes
2 Bookmarks
0 Replies
0 Quotes
⚠️ CISA flags active exploitation of F5 BIG-IP flaw (CVE-2025-53521) enabling RCE. High risk for lateral movement & data theft. Patch now. Details: https://t.co/pMXVFMEqCF… #CyberSecurity https://t.co/1w7eZj6cjb
@7thGensec
28 Mar 2026
108 Impressions
2 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA added CVE-2025-53521, a critical vulnerability in F5 BIG-IP APM, to its Known Exploited Vulnerabilities catalog due to active exploitation. This flaw allows remote code execution (RCE) and affects versions 15.1.0 to 17.5. https://t.co/45YNR8Vzm9
@securityRSS
28 Mar 2026
92 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521) - Help Net Security - https://t.co/UPKVTw6fkT
@moton
28 Mar 2026
70 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 تحذير NCSC من استغلال لثغرة أمنية حرجة في F5 BIG-IP أصدر المركز الوطني للأمن السيبراني (NCSC) تحذيرًا بشأن استغلال نشط لثغرة أمنية حرجة (CVE-2025-53521) تؤثر على منتجا
@MisbarSec
28 Mar 2026
278 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Urgent Alert! CISA has added CVE-2025-53521 to its KEV catalog due to active exploitation of F5 BIG-IP APM. If you use F5 BIG-IP APM, patch immediately to secure your systems! #CyberSecurity #F5BIGIP https://t.co/ioXxuvAOWC
@xcybersecnews
28 Mar 2026
67 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
米国CISAが悪用を確認した脆弱性 #KEV をカタログに追加しました。(3/27追加) 🛡️No.1555 CVE-2025-53521 F5 BIG-IP Remote Code Execution Vulnerability ==================================== ✅概要 ・深刻度:緊急🔥 9.3 (CVSS Base) / NVD
@piyokango
28 Mar 2026
4603 Impressions
3 Retweets
13 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨 CYBERDUDEBIVASH SENTINEL APEX ALERT 🚨 Threat: Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521) Intel Report: https://t.co/FHbBlNx0el
@cyberbivash
28 Mar 2026
62 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CYBERDUDEBIVASH SENTINEL APEX ALERT 🚨 Threat: CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation Intel Report: https://t.co/1vbJZtIjnB
@cyberbivash
28 Mar 2026
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA has added CVE-2025-53521, a critical remote code execution flaw in F5 BIG-IP Access Policy Manager, to its Known Exploited Vulnerabilities catalog. https://t.co/FByxRCeXUM #CyberSecurity #F5BIGIP #CISA #KEV #RCE #Vulnerability #PatchNow #InfoSec #NetworkSecurity https://t.
@redsecuretech
28 Mar 2026
79 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
BREAKING: CISA adds actively exploited F5 BIG-IP APM RCE bug CVE-2025-53521 (CVSS 9.8) to KEV catalog after nation-state breach, unauthenticated attackers can run arbitrary code. https://t.co/IgB0A0MJ8X
@threatcluster
28 Mar 2026
101 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA adds CVE-2025-53521, a critical F5 BIG-IP APM flaw enabling pre-auth remote code execution (CVSS 9.3), to KEV after active exploitation. F5 updates TTPs and requires patches by 2026. #F5Security #Vulnerability #USA https://t.co/GRODEEpGlL
@TweetThreatNews
28 Mar 2026
177 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🔴 Cautious · 🛡️ Safety 🚨 CISA Flags F5 BIG-IP APM Vulnerability After Active Exploitation 🔗 Source: The Hacker News The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-53521, affecting F5's BIG-IP APM, to its Known Exploited Vulner
@ElSapoLabs
28 Mar 2026
80 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISAが既知の悪用された脆弱性を1件カタログに追加 https://t.co/SDcHBlUqPW CVE-2025-53521 F5 BIG-IPのリモートコード実行の脆弱性
@cybersecnews_jp
28 Mar 2026
84 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA ADICIONA CVE-2025-53521 AO KEV APÓS EXPLORAÇÃO ATIVA DO F5 BIG-IP APM https://t.co/gu1BY5d5lk #SamirNews #cisa #adiciona #cve202553521 #ao #kev #após #exploração #ativa #do #f5 #bigip #apm
@CanalFs0ciety
28 Mar 2026
89 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Atenção! A vulnerabilidade CVE-2025-53521 no F5 BIG-IP APM pode permitir a execução remota de código por atacantes. 🛡️ Aplique as mitigations conforme instruções do fornecedor ou descontinue o uso do produto. Fique seguro! #CyberSecurity #InfoSec #CVE
@fernandokarl
28 Mar 2026
82 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Mar 28, 2026 🚨 CISA has added CVE-2025-53521 to its KEV catalog due to active exploitation of a critical flaw in F5 BIG-IP APM, allowing remote code execution. Stay vigilant! https://t.co/8ZfbZA0O7s
@kernyx64
28 Mar 2026
86 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521) https://t.co/P0evm0sdTm
@TheCyberSecHub
28 Mar 2026
698 Impressions
4 Retweets
6 Likes
0 Bookmarks
1 Reply
0 Quotes
CISA added F5 BIG-IP APM vulnerability (CVE-2025-53521, CVSS 9.3) to KEV catalog. Active exploitation confirmed. Originally classified as DoS, reclassified to RCE. Federal patch deadline set. #cybersecurity https://t.co/y3SZQrLxI5
@battista212
28 Mar 2026
93 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Attackers are exploiting RCE vulnerability in BIG-IP #APM #systems (#CVE-2025-53521) https://t.co/11WXyGtxmS
@ScyScan
28 Mar 2026
86 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Critical F5 BIG-IP CVE-2025-53521 to KEV Catalog #cve202553521 #f5bigip #remotecodeexecution https://t.co/JR6BXZIEHw
@Anavem_
28 Mar 2026
80 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521) - https://t.co/6eXjNsiDpm - @CISACyber @F5 #BIGIP #AccessManagement #AccessControl #Enterprise #Vulnerability #Exploited #CybersecurityNews #InfosecNew
@helpnetsecurity
28 Mar 2026
405 Impressions
0 Retweets
4 Likes
1 Bookmark
1 Reply
0 Quotes
[HelpNet] Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521). A critical unauthenticated remote code execution vulnerability (CVE-2025-53521) in F5’s BIG-IP Access Policy Manager (APM) solution is under active... https://t.co/y7UhXTyfJt
@shah_sheikh
28 Mar 2026
86 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical unauthenticated remote code execution vulnerability (CVE-2025-53521) in F5’s BIG-IP Access Policy Manager (APM) solution is under active exploitation, the US Cybersecurity and Infrastructure… https://t.co/H6j5BdTSIY #CyberSecurity #RCE #Vulnerability #CVE2025 #F5BI
@vtbcfeed
28 Mar 2026
78 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 F5 BIG-IPにRCE脆弱性! CISAがCVE-2025-53521をKEVに追加。Activeな悪用が確認されています!BIG-IP APMの脆弱性により、リモートでコードが実行されるリスク⚠️ 対策済みですか?早急なアップデートを推奨します
@motch_dev
28 Mar 2026
110 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A0C1CA-EDEF-463F-B7C8-8B9E67239FC1",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6538FBFE-AE3F-41DC-BE48-8A2444DE1F39",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CDAF78A-6C2B-4640-93DD-524A0D9D80CE",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEC05AA-EB63-4A34-94E8-81606329BA75",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3007970-0661-4CAC-91A6-363396ED3B41",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2450DC77-B46C-4886-AC9A-CF78B1EC4F06",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8BC9B56-DC91-4312-9A37-0892E1DCC97D",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C25C2C-608A-432F-B49C-CED71150801C",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96D77245-3641-49B9-BC32-472D460E5C1F",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37AF1DFD-AE86-4F64-9941-75FAA0186ED8",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "87D1615C-6A97-4530-8E3A-92141B6EECD8",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "787649F6-17ED-4EFE-9C48-8318FEB941E7",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "268F789C-AC21-4CE9-9000-8E8B5CB38D2F",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A04C923A-BBBC-4C4A-A653-B14C2CCEF3D9",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1DE6647-EC65-46DB-BE41-826C0BE3CBF4",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC47EDCD-06E7-4A5C-BD95-E10CC151494E",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A5E3508-3BD2-4275-A654-B379EB95A5C2",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB854FAF-E3B8-4D94-8346-57B73D5B95FE",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40B87228-F144-41C7-ACD8-1168CC5C57F3",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC86368-6FD4-4232-9E33-8B14B783C6C9",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96451762-2663-4773-BA48-CD437150C827",
"versionEndExcluding": "15.1.10.8",
"versionStartIncluding": "15.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6494E2A7-1473-46C0-97F8-90827D9466AA",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56128695-2B01-4B7D-AC5F-DCDFCFE28BD6",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "025BE711-822D-4840-920C-E8636DA97738",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F28A7BB-AC00-4AB0-94CE-798890A6EA01",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E36153D6-A0AF-41DA-B99F-ACD3333D5092",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A23DB2A-FB60-4DA3-A7CD-D714BE1BDFBD",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9F00EE-50B8-4B4F-BACB-F0599EBEE946",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00A47522-6E92-4441-9B88-223863F06061",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67C3778D-1F87-40AD-9163-883CEC3C1712",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D17FD44-D4DB-40FC-8A0D-018EE6650975",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92891C8E-D1E2-4128-9C3E-95DD922760F2",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1381CA01-0A3D-4027-8B2D-DA773F0F2447",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFBC3076-EA5C-4D18-943A-E5574FEEAE05",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72789BAC-8984-4364-857C-E6050F35DACD",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A63DAF65-3864-4979-8AB5-A415DEE43527",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17A49B38-5E69-4288-8D3B-468C7B32EC4B",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C4CCE82-6E33-4448-899E-3938E9F26364",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE263046-0C37-4DEC-A2BD-9056534F497D",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7829108D-71A4-4F91-81F6-804E9EB1AE9D",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE79228D-BD43-4ADF-A36F-88DA748D83A2",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE6EAF28-5EEF-4333-A911-37DB84419B75",
"versionEndExcluding": "16.1.6.1",
"versionStartIncluding": "16.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96D35435-27A7-4A88-9432-1F5AB0112B8C",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BD71EC53-8ABC-410F-B031-0B3288D2E8DF",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19F0ED03-65CE-461B-97CE-ECBE2D290A5C",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFDDB2A2-3B00-4454-A5BA-F181972B8B70",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B24E3BE-8A62-4819-B63C-01EE10E6160F",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFFB39F-3E07-4316-9DD6-C36407B09C20",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5560B775-1D1A-4B91-BF73-8214C54E0136",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6E75F5E-8C80-4287-84BF-6676B1029AA6",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E79DDBA8-2BAA-45CF-ADDB-E0CD29EFCD69",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26D5B297-AAD7-4DF5-9C24-E9550DF2793A",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF0F0A9D-1B7E-4271-B309-64399AC7DD89",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5082DEBB-5C7F-41A2-B48F-0C72C3A6782B",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C71682-BEF8-4916-AEA3-C6B73229BC7D",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39AA59D4-6DE8-4ABA-9EEB-840755CA76A2",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A5E22E-BC34-428B-8230-7950FEA1F426",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83FBED4E-1977-45EF-8D33-4A24D81BFE7C",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F6EB345-1978-44BA-9FFD-B1F0F98E8424",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F64237A9-9AF0-4D01-958F-753862C33ABF",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4503795E-1956-40E5-A4AA-096D5CE35197",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "205B3D36-A3D8-4859-A3C4-2FA432B4A162",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B1DA3DB-754B-4CB1-9970-8FE24F8904D7",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66DDBE6D-423A-4F60-9D06-0E10CB93FB66",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60F7DB59-2F2B-4AC7-B058-2DB7C9C4DE87",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B21289-FB5C-47FA-B054-50341236260D",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20E70B13-F29C-45AA-87CD-96AF990A524C",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7F7C488-8C01-4EE7-A244-259237F06668",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4685C82-B428-406D-917A-9A7D6167C848",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E649795C-1B70-411B-B744-E0728109474D",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3428C746-89F5-499B-99E3-E7F9A04AA6E5",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "827B18BF-818E-42DB-A8F5-B3DA845EB658",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8EF0B1D-AE26-4283-8D84-5CECB245652F",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F5003F-A341-4C95-B402-1C0AF5530039",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1487CA-A5F3-4689-9458-7309C2E17C9E",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "022E0278-5754-4C93-9B54-1BAB3948A534",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F234CDF-C413-4E70-9A97-6467ADB33EA9",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "581B1484-C457-4C11-B43A-DCF49EBC07DA",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCBD1B79-3FC1-4288-BEF8-E5D60DA939A6",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A52583A0-7F8A-4B20-9C92-677FD176FFE4",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83AD64DE-7D0B-4380-89E0-A06817B21606",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CBB901CA-EF5B-437C-BDE0-65117E086B8E",
"versionEndExcluding": "17.1.3",
"versionStartIncluding": "17.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1516CC2-94CA-4FB2-AC5A-6CFB0580980C",
"versionEndIncluding": "17.5.1",
"versionStartIncluding": "17.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]