{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T12:50:34.761","vulnerabilities":[{"cve":{"id":"CVE-2018-5527","sourceIdentifier":"f5sirt@f5.com","published":"2018-06-27T20:29:05.963","lastModified":"2024-11-21T04:09:00.030","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"On BIG-IP 13.1.0-13.1.0.7, a remote attacker using undisclosed methods against virtual servers configured with a Client SSL or Server SSL profile that has the SSL Forward Proxy feature enabled can force the Traffic Management Microkernel (tmm) to leak memory. As a result, system memory usage increases over time, which may eventually cause a decrease in performance or a system reboot due to memory exhaustion."},{"lang":"es","value":"En BIG-IP 13.1.0-13.1.0.7, un atacante remoto que emplea métodos no revelados contra servidores virtuales configurados con un perfil Client SSL o Server SSL con la característica SSL Forward Proxy habilitada puede forzar al TMM (Traffic Management Microkernel) a filtrar memoria. Como resultado, el uso de la memoria del sistema aumenta con el tiempo, lo que podría provocar un descenso del rendimiento o un reinicio del sistema debido al agotamiento de memoria."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-772"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"9F921FE3-B481-4552-AE7C-FEE05DB6D301"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"B6F24FC1-B549-48F9-AF0E-AB441E5EE4B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"05456A39-5301-421B-853A-4651E1B13DE8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"CE608E62-F3E2-405C-8239-760A7C1E1527"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"240713C2-D6EC-4C44-9057-C9567956F66F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"7B73F018-4FAD-48B3-9806-FC827787E323"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"11876D9C-0082-454A-8254-B5FD74E87719"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"A00660C1-7A1C-42CF-A829-503DC2EC08E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"49F45207-07ED-4DF8-ABDA-4AD3E9CA26D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"EFECB54D-C240-495E-A97B-6694BB992C9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"1D43A55D-E9D4-45A3-8B41-B4B22BE4A536"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"D9479031-90AA-4C1D-B14C-CDFFBC99CCDE"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndIncluding":"13.1.0.7","matchCriteriaId":"319C172E-5999-4952-864F-B484F2A25EBE"}]}]}],"references":[{"url":"http://www.securitytracker.com/id/1041196","source":"f5sirt@f5.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.f5.com/csp/article/K20134942","source":"f5sirt@f5.com","tags":["Vendor Advisory"]},{"url":"http://www.securitytracker.com/id/1041196","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.f5.com/csp/article/K20134942","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}