F5 Big-ip Application Acceleration Manager

CVSS Base Metrics

Access Vector (AV)

The access vector (AV) shows how a vulnerability may be exploited.

Access Complexity (AC)

The access complexity (AC) metric describes how easy or difficult it is to exploit the discovered vulnerability.

Authentication (Au)

The authentication (Au) metric describes the number of times that an attacker must authenticate to a target to exploit it. It does not include (for example) authentication to a network in order to gain access. For locally exploitable vulnerabilities, this value should only be set to Single or Multiple if further authentication is required after initial access.

Attack Vector (AV)

This metric reflects the context by which vulnerability exploitation is possible.

Attack Complexity (AC)

This metric depicts the situations that are not under the attackers control and are required to exploit vulnerability.

Privileges Required (PR)

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

User Interaction (UI)

This metric captures the requirement for a user, other than the attacker, to participate in the successful compromise the vulnerable component.

Scope (S)

This metric is a determination on whether a vulnerability in one system or component can have carry over impact on another system or component.

CVSS Impact Metrics

Confidentiality (C)

The confidentiality (C) metric describes the impact on the confidentiality of data processed by the system.

Integrity (I)

The Integrity (I) metric describes the impact on the integrity of the exploited system.

Availability (A)

The availability (A) metric describes the impact on the availability of the target system. Attacks that consume network bandwidth, processor cycles, memory or any other resources affect the availability of a system.

Confidentiality (C)

This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.

Integrity (I)

This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.

Availability (A)

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. It refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component.

Title CPE22 CPE23 Type Vendor Product Version Update Edition Language SW Edition Target SW Target HW Other
Title CPE22 CPE23 Type Vendor Product Version Update Edition Language SW Edition Target SW Target HW Other
URL Type
http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15296.html
https://f5.com/ Vendor
https://f5.com/Portals/1/PDF/JAPAN/PRODUCTS/AAM/BIP_AAM_datasheet.pdf Product
https://f5.com/products/big-ip/application-acceleration-manager-aam Product
https://f5.com/products/modules/advanced-firewall-manager Product
https://f5.com/products/modules/application-acceleration-manager Product
https://f5.com/products/modules/local-traffic-manager Product
https://my.f5.com/manage/s/article/K000130415 Advisory
https://my.f5.com/manage/s/article/K000132726 Advisory
https://my.f5.com/manage/s/article/K000133132 Advisory
https://my.f5.com/manage/s/article/K000133467 Advisory
https://my.f5.com/manage/s/article/K000133474 Advisory
https://my.f5.com/manage/s/article/K000137353 Advisory
https://my.f5.com/manage/s/article/K05710614 Advisory
https://my.f5.com/manage/s/article/K24572686 Advisory
https://my.f5.com/manage/s/article/K34525368 Advisory
https://my.f5.com/manage/s/article/K56412001 Advisory
https://my.f5.com/manage/s/article/K58550078 Advisory
https://my.f5.com/manage/s/article/K83120834 Advisory
https://nvd-admin.nist.gov/admin/consoles/client/index.webadmin.html#/vuln/detail/CVE-2019-6642?tab=REFERENCES Version
https://support.f5.com/csp/#/article/K87416818 Advisory
https://support.f5.com/csp/#/article/K92859602 Advisory
https://support.f5.com/csp/#/home Vendor
https://support.f5.com/csp/article/K01054113 Advisory
https://support.f5.com/csp/article/K04897373 Advisory
https://support.f5.com/csp/article/K05112543 Advisory
https://support.f5.com/csp/article/K06725231?utm_source=f5support&utm_medium=RSS Advisory
https://support.f5.com/csp/article/K11447758 Advisory
https://support.f5.com/csp/article/K12936322 Advisory
https://support.f5.com/csp/article/K14229426 Advisory
https://support.f5.com/csp/article/K18535734 Advisory
https://support.f5.com/csp/article/K20622530 Advisory
https://support.f5.com/csp/article/K21971977 Advisory
https://support.f5.com/csp/article/K2200 Version
https://support.f5.com/csp/article/K23860356 Advisory
https://support.f5.com/csp/article/K25400442 Advisory
https://support.f5.com/csp/article/K25691186 Advisory
https://support.f5.com/csp/article/K29280193 Advisory
https://support.f5.com/csp/article/K31301245 Advisory
https://support.f5.com/csp/article/K31523465 Advisory
https://support.f5.com/csp/article/K33062581 Version
https://support.f5.com/csp/article/K36814487 Advisory
https://support.f5.com/csp/article/K37451543 Advisory
https://support.f5.com/csp/article/K40378764 Advisory
https://support.f5.com/csp/article/K42696541 Advisory
https://support.f5.com/csp/article/K45644893 Advisory
https://support.f5.com/csp/article/K47527163 Advisory
https://support.f5.com/csp/article/K50046200 Advisory
https://support.f5.com/csp/article/K50343028 Advisory
https://support.f5.com/csp/article/K52145254 Advisory
https://support.f5.com/csp/article/K53590702 Advisory
https://support.f5.com/csp/article/K54336216 Advisory
https://support.f5.com/csp/article/K55655944 Advisory
https://support.f5.com/csp/article/K64571774 Advisory
https://support.f5.com/csp/article/K68652018 Advisory
https://support.f5.com/csp/article/K72442354 Advisory
https://support.f5.com/csp/article/K72540690 Advisory
https://support.f5.com/csp/article/K73274382 Advisory
https://support.f5.com/csp/article/K75111593 Advisory
https://support.f5.com/csp/article/K75532331 Advisory
https://support.f5.com/csp/article/K76052144 Advisory
https://support.f5.com/csp/article/K77671456 Advisory
https://support.f5.com/csp/article/K91158923 Advisory
https://support.f5.com/csp/article/K91171450 Advisory
https://support.f5.com/csp/article/K9412 Project
https://support.f5.com/csp/article/K95434410 Advisory
https://support.f5.com/csp/knowledge-center/software Project
https://support.f5.com/csp/knowledge-center/software/BIG-IP Change Log
https://support.f5.com/csp/knowledge-center/software/BIG-IP?module=BIG-IP%20AFM&version=14.1.0 Version
https://support.f5.com/csp/knowledge-center/software/BIG-IP?module=BIG-IP%20Analytics&version=11.6.3 Version
https://support.f5.com/csp/knowledge-center/software/BIG-IP?module=BIG-IP%20APM&version=14.0.0 Version
https://support.f5.com/csp/knowledge-center/software/BIG-IP?module=BIG-IP%20APM&version=15.0.0 Version
https://support.f5.com/csp/knowledge-center/software/BIG-IP?module=BIG-IP%20LTM&version=11.6.5 Change Log
https://support.f5.com/csp/knowledge-center/software/BIG-IP?module=BIG-IP%20LTM&version=12.1.3 Version
https://support.f5.com/kb/en-us/products.html Vendor
https://support.f5.com/kb/en-us/products/big-ip_apm.html Product
https://support.f5.com/kb/en-us/products/big-ip_asm.html Product
https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/product/relnote-bigip-11-5-8.html Version
https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/relnote-supplement-bigip-13-1-1.html Version
https://support.f5.com/kb/en-us/solutions/public/16000/700/sol16728.html Advisory
https://support.f5.com/kb/en-us/solutions/public/k/00/sol00265182.html Advisory
https://support.f5.com/kb/en-us/solutions/public/k/11/sol11772107.html Advisory
https://support.f5.com/kb/en-us/solutions/public/k/75/sol75136237.html Advisory
https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/relnote-supplement-bigip-11-6-3-2.html Version
https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/relnote-supplement-bigip-12-1-3-7.html Version
https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/relnote-supplement-bigip-15-1-1.html Change Log
https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/relnote-supplement-bigip-16-0-1-1.html Version
https://www.f5.com/ Vendor
https://www.f5.com/products Product
https://www.f5.com/products/big-ip-services Product
https://www.f5.com/services/training/free-training-courses/getting-started-with-big-ip-application-acceleration-manager-aam Product
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...