Under certain conditions, a potential data leak may occur in the Traffic Management Microkernels (TMMs) of BIG-IP tenants running on VELOS and rSeries platforms. However, this issue cannot be exploited by an attacker because it is not consistently reproducible and is beyond an attacker's control. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
2024-05-08T15:15:10.330
2025-10-21T11:38:58.723
Analyzed
CVSSv3.1: 6.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | f5 | big-ip_access_policy_manager | < 15.1.10 | Yes |
| Application | f5 | big-ip_advanced_firewall_manager | < 15.1.10 | Yes |
| Application | f5 | big-ip_advanced_web_application_firewall | < 15.1.10 | Yes |
| Application | f5 | big-ip_analytics | < 15.1.10 | Yes |
| Application | f5 | big-ip_application_acceleration_manager | < 15.1.10 | Yes |
| Application | f5 | big-ip_application_security_manager | < 15.1.10 | Yes |
| Application | f5 | big-ip_application_visibility_and_reporting | < 15.1.10 | Yes |
| Application | f5 | big-ip_automation_toolchain | < 15.1.10 | Yes |
| Application | f5 | big-ip_carrier-grade_nat | < 15.1.10 | Yes |
| Application | f5 | big-ip_container_ingress_services | < 15.1.10 | Yes |
| Application | f5 | big-ip_ddos_hybrid_defender | < 15.1.10 | Yes |
| Application | f5 | big-ip_domain_name_system | < 15.1.10 | Yes |
| Application | f5 | big-ip_edge_gateway | < 15.1.10 | Yes |
| Application | f5 | big-ip_fraud_protection_service | < 15.1.10 | Yes |
| Application | f5 | big-ip_global_traffic_manager | < 15.1.10 | Yes |
| Application | f5 | big-ip_link_controller | < 15.1.10 | Yes |
| Application | f5 | big-ip_local_traffic_manager | < 15.1.10 | Yes |
| Application | f5 | big-ip_policy_enforcement_manager | < 15.1.10 | Yes |
| Application | f5 | big-ip_ssl_orchestrator | < 15.1.10 | Yes |
| Application | f5 | big-ip_webaccelerator | < 15.1.10 | Yes |
| Application | f5 | big-ip_websafe | < 15.1.10 | Yes |