Oct. 10, 2023, 1:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing BIG-IP external monitor on a BIG-IP system.  A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

attacker big big-ip bypass cve end exploit external may mode monitor restrictions role running security software support system technical technical support

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Cybersecurity CASB Engineer - Corporate (Las Vegas)

@ Caesars Entertainment | United States

Cyber Security Engineer II (Boundary Protection,WAF, ZTNA,AWS)

@ FICO | Bengaluru, India