F5 Big-IP Next Service Proxy For Kubernetes 1.8.0

CPE Details

F5 Big-IP Next Service Proxy For Kubernetes 1.8.0
1.8.0
2025-08-08
16h55 +00:00
2025-08-08
16h55 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:1.8.0:*:*:*:*:*:*:*

Informations

Vendor

f5

Product

big-ip_next_service_proxy_for_kubernetes

Version

1.8.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-61990 2025-10-15 15h19 +00:00 When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
8.7
Haute
CVE-2025-61974 2025-10-15 13h55 +00:00 When a client SSL profile is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
8.7
Haute
CVE-2025-55670 2025-10-15 13h55 +00:00 On BIG-IP Next CNF, BIG-IP Next SPK, and BIG-IP Next for Kubernetes systems, repeated undisclosed API calls can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
7.1
Haute
CVE-2025-60016 2025-10-15 13h55 +00:00 When Diffie-Hellman (DH) group Elliptic Curve Cryptography (ECC) Brainpool curves are configured in an SSL profile's Cipher Rule or Cipher Group, and that profile is applied to a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
8.7
Haute