{"api_version":"1","generated_at":"2026-05-13T05:23:29+00:00","cve":"CVE-2014-8730","urls":{"html":"https://cve.report/CVE-2014-8730","api":"https://cve.report/api/cve/CVE-2014-8730.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-8730","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-8730"},"summary":{"title":"CVE-2014-8730","description":"The SSL profiles component in F5 BIG-IP LTM, APM, and ASM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, AAM 11.4.0 through 11.5.1, AFM 11.3.0 through 11.5.1, Analytics 11.0.0 through 11.5.1, Edge Gateway, WebAccelerator, and WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, PEM 11.3.0 through 11.6.0, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.4.1 and BIG-IQ Cloud and Security 4.0.0 through 4.4.0 and Device 4.2.0 through 4.4.0, when using TLS 1.x before TLS 1.2, does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).  NOTE: the scope of this identifier is limited to the F5 implementation only. Other vulnerable implementations should receive their own CVE ID, since this is not a vulnerability within the design of TLS 1.x itself.","state":"PUBLISHED","assigner":"mitre","published_at":"2014-12-10 00:59:01","updated_at":"2026-05-06 22:30:45"},"problem_types":["CWE-310","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:N/AC:M/Au:N/C:P/I:N/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"}}],"references":[{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693495","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21693495","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Bulletin: TLS padding vulnerability affects IBM Sterling Connect:Direct for Microsoft Windows (CVE-2014-8730)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693271","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21693271","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Bulletin: TLS padding vulnerability affects Communications Server for Windows (CVE-2014-8730)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/62388","name":"http://secunia.com/advisories/62388","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"About Secunia Research | Flexera","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.lenovo.com/us/en/product_security/poodle","name":"https://support.lenovo.com/us/en/product_security/poodle","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"POODLE: SSLv3 Vulnerability - Lenovo Support (US)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693337","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21693337","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Bulletin: TLS padding vulnerability affects Sterling Connect:Direct for UNIX (CVE-2014-8730)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://marc.info/?l=bugtraq&m=144372772101168&w=2","name":"http://marc.info/?l=bugtraq&m=144372772101168&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'[security bulletin] HPSBPV03516 rev.1 - HP VAN SDN Controller, Multiple Vulnerabilities' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.imperialviolet.org/2014/12/08/poodleagain.html","name":"https://www.imperialviolet.org/2014/12/08/poodleagain.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"ImperialViolet - The POODLE bites again","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151","name":"https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"CVE-2014-8730 Padding issue","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2014/12/09/27","name":"http://www.openwall.com/lists/oss-security/2014/12/09/27","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"oss-security - Re: CVE question: Return of POODLE","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"HPE Support document - HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62224","name":"http://secunia.com/advisories/62224","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Advisory SA62224 - IBM Sterling Connect:Direct for Windows TLS Version 1.x CBC Cipher Padding Information Disclosure Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.lenovo.com/product_security/poodle","name":"https://support.lenovo.com/product_security/poodle","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"POODLE: SSLv3 Vulnerability - US","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62167","name":"http://secunia.com/advisories/62167","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Advisory SA62167 - IBM Sterling Connect:Direct for UNIX TLS Version 1.x CBC Cipher Padding Information Disclosure Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15882.html","name":"https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15882.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"SOL15882 - TLS1.x padding vulnerability  CVE-2014-8730","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-8730","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8730","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"10.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"10.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"10.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"10.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"10.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"10.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"11.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"11.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"11.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"11.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"11.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"11.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_access_policy_manager","cpe6":"11.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"11.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"11.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"11.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_advanced_firewall_manager","cpe6":"11.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"11.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"11.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"11.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"11.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"11.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"11.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"11.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_analytics","cpe6":"11.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"11.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"11.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"11.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"11.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_acceleration_manager","cpe6":"11.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"10.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"10.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"10.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"10.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"10.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"10.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"10.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"10.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"11.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"11.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"11.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"11.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"11.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"11.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_application_security_manager","cpe6":"11.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"10.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"10.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"10.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"10.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"10.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"10.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"11.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"11.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"11.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"11.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_edge_gateway","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"10.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"10.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"10.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"10.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"10.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"10.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"10.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"10.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"11.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"11.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"11.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"11.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"11.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"11.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_local_traffic_manager","cpe6":"11.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"11.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"11.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"11.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"11.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_policy_enforcement_manager","cpe6":"11.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"10.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"10.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"10.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"10.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"10.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"10.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"10.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"10.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"11.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"11.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"11.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"11.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"11.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_protocol_security_module","cpe6":"11.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"10.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"10.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"10.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"10.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"10.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"10.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"10.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"10.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"11.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"11.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"11.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"11.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_wan_optimization_manager","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"10.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"10.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"10.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"10.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"10.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"10.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"10.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"10.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"11.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"11.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"11.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"11.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-ip_webaccelerator","cpe6":"11.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_cloud","cpe6":"4.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_cloud","cpe6":"4.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_cloud","cpe6":"4.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_cloud","cpe6":"4.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_cloud","cpe6":"4.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_device","cpe6":"4.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_device","cpe6":"4.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_device","cpe6":"4.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_security","cpe6":"4.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_security","cpe6":"4.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_security","cpe6":"4.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_security","cpe6":"4.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8730","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"f5","cpe5":"big-iq_security","cpe6":"4.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2014-8730","qid":"590920","title":"ABB Relion 650 series Secure Sockets Layer (SSL) 3.0 Protocol and POODLE Attack Multiple Vulnerabilities (ABB-VU-PSAC-1MRG018009)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T13:26:02.525Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"62167","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/62167"},{"name":"[oss-security] 20141209 Re: CVE question: Return of POODLE","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2014/12/09/27"},{"name":"HPSBPV03516","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=144372772101168&w=2"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693495"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151"},{"name":"62224","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/62224"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.lenovo.com/us/en/product_security/poodle"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.imperialviolet.org/2014/12/08/poodleagain.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693271"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693337"},{"name":"62388","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/62388"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.lenovo.com/product_security/poodle"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15882.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2014-12-08T00:00:00.000Z","descriptions":[{"lang":"en","value":"The SSL profiles component in F5 BIG-IP LTM, APM, and ASM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, AAM 11.4.0 through 11.5.1, AFM 11.3.0 through 11.5.1, Analytics 11.0.0 through 11.5.1, Edge Gateway, WebAccelerator, and WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, PEM 11.3.0 through 11.6.0, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.4.1 and BIG-IQ Cloud and Security 4.0.0 through 4.4.0 and Device 4.2.0 through 4.4.0, when using TLS 1.x before TLS 1.2, does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).  NOTE: the scope of this identifier is limited to the F5 implementation only. Other vulnerable implementations should receive their own CVE ID, since this is not a vulnerability within the design of TLS 1.x itself."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2016-12-30T16:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"62167","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/62167"},{"name":"[oss-security] 20141209 Re: CVE question: Return of POODLE","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2014/12/09/27"},{"name":"HPSBPV03516","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=144372772101168&w=2"},{"tags":["x_refsource_CONFIRM"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693495"},{"tags":["x_refsource_CONFIRM"],"url":"https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151"},{"name":"62224","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/62224"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.lenovo.com/us/en/product_security/poodle"},{"tags":["x_refsource_MISC"],"url":"https://www.imperialviolet.org/2014/12/08/poodleagain.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635"},{"tags":["x_refsource_CONFIRM"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693271"},{"tags":["x_refsource_CONFIRM"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693337"},{"name":"62388","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/62388"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.lenovo.com/product_security/poodle"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15882.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2014-8730","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The SSL profiles component in F5 BIG-IP LTM, APM, and ASM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, AAM 11.4.0 through 11.5.1, AFM 11.3.0 through 11.5.1, Analytics 11.0.0 through 11.5.1, Edge Gateway, WebAccelerator, and WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, PEM 11.3.0 through 11.6.0, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.4.1 and BIG-IQ Cloud and Security 4.0.0 through 4.4.0 and Device 4.2.0 through 4.4.0, when using TLS 1.x before TLS 1.2, does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).  NOTE: the scope of this identifier is limited to the F5 implementation only. Other vulnerable implementations should receive their own CVE ID, since this is not a vulnerability within the design of TLS 1.x itself."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"62167","refsource":"SECUNIA","url":"http://secunia.com/advisories/62167"},{"name":"[oss-security] 20141209 Re: CVE question: Return of POODLE","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2014/12/09/27"},{"name":"HPSBPV03516","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144372772101168&w=2"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21693495","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693495"},{"name":"https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151","refsource":"CONFIRM","url":"https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151"},{"name":"62224","refsource":"SECUNIA","url":"http://secunia.com/advisories/62224"},{"name":"https://support.lenovo.com/us/en/product_security/poodle","refsource":"CONFIRM","url":"https://support.lenovo.com/us/en/product_security/poodle"},{"name":"https://www.imperialviolet.org/2014/12/08/poodleagain.html","refsource":"MISC","url":"https://www.imperialviolet.org/2014/12/08/poodleagain.html"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21693271","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693271"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21693337","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21693337"},{"name":"62388","refsource":"SECUNIA","url":"http://secunia.com/advisories/62388"},{"name":"https://support.lenovo.com/product_security/poodle","refsource":"CONFIRM","url":"https://support.lenovo.com/product_security/poodle"},{"name":"https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15882.html","refsource":"CONFIRM","url":"https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15882.html"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2014-8730","datePublished":"2014-12-10T00:00:00.000Z","dateReserved":"2014-11-10T00:00:00.000Z","dateUpdated":"2024-08-06T13:26:02.525Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2014-12-10 00:59:01","lastModifiedDate":"2026-05-06 22:30:45","problem_types":["CWE-310","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.0:*:*:*:*:*:*:*","matchCriteriaId":"8E1C4384-1728-4A71-8634-DCE3F2AEB8F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1AC8AA37-9962-4CF6-99E5-A6F94582B107"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.1.0:*:*:*:*:*:*:*","matchCriteriaId":"AF1FD1C1-6980-4E9F-8DEF-D9E552510481"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.0:*:*:*:*:*:*:*","matchCriteriaId":"A9F443F1-C43F-42AD-98E4-AE11C72F363E"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.1:*:*:*:*:*:*:*","matchCriteriaId":"1AF61656-A266-4A2D-A001-54339716A4A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.2:*:*:*:*:*:*:*","matchCriteriaId":"3FC92F47-75EB-487A-B4A2-2B0B4C78B10D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.3:*:*:*:*:*:*:*","matchCriteriaId":"C16CD0C3-13CC-46D2-8E33-A98B3ACC1992"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.4:*:*:*:*:*:*:*","matchCriteriaId":"FE056B1B-5037-453C-B845-06A507452821"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*","matchCriteriaId":"C72FF118-E7A5-42DE-A9A0-703E71615045"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"45A53EC8-8E16-42DC-9FD8-58493C5D1EC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"DDB299B4-5893-4D91-8E5B-09BDFDB86FEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"F9EA336A-8055-4DA8-8F79-07C4ADE83E32"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"624EFAEB-15C2-422F-BAD1-D0BC37878349"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.0:*:*:*:*:*:*:*","matchCriteriaId":"76C1525D-46DE-4362-BBAD-095BBF718990"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.1:*:*:*:*:*:*:*","matchCriteriaId":"259C05BB-6349-4005-9372-21623DC5002D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*","matchCriteriaId":"12F86EB5-D581-4103-A802-44D968BA8D55"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:10.1.0:*:*:*:*:*:*:*","matchCriteriaId":"F5BE38A0-CD2F-4C18-9EE3-D56A23BDB73A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.0:*:*:*:*:*:*:*","matchCriteriaId":"476D58C4-7699-45AC-B987-B42B5488240B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.1:*:*:*:*:*:*:*","matchCriteriaId":"30A1197A-7196-49AA-B368-5539180B8B93"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.2:*:*:*:*:*:*:*","matchCriteriaId":"E3F73DC1-9174-4842-B772-D277D293214A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.3:*:*:*:*:*:*:*","matchCriteriaId":"B2BEA4E9-125B-47D7-99D0-DE469839622F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.4:*:*:*:*:*:*:*","matchCriteriaId":"B1FB07A3-8D07-44F6-B827-B22D3799A707"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:*","matchCriteriaId":"DD575B3E-FBA9-443A-9B52-49766DBE40C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"F8F3BF3A-DC42-45F4-99C0-DF71DB1A9E44"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"002333F5-2864-434F-AC94-9C644098F95C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FB630A86-FB84-4199-9E4D-38EB620806CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"ABF47456-CCA0-4817-9AEF-631DC152174E"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.4.0:*:*:*:*:*:*:*","matchCriteriaId":"FB5F9107-549C-40EF-B355-C7E93A979CDD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.0:*:*:*:*:*:*:*","matchCriteriaId":"1C0312FC-8178-46DE-B4EE-00F2895073BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.1:*:*:*:*:*:*:*","matchCriteriaId":"BC6C5628-14FF-4D75-B62E-D4B2707C1E3D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"3CA52816-C4B7-4B1E-A950-EE9B571CB06B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.0:*:*:*:*:*:*:*","matchCriteriaId":"F2AA5127-5314-4026-905D-937B7B62473F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.4.1:*:*:*:*:*:*:*","matchCriteriaId":"09E42DAA-700D-487C-9238-F7F3D75A8C1A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*","matchCriteriaId":"1B6EA0C0-9C26-4A87-98F1-5B317D606ECB"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*","matchCriteriaId":"4D379372-A226-4230-B1F3-04C696518BD8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*","matchCriteriaId":"CB8D3B87-B8F5-490A-B1D9-04F2EE93EEA3"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.0:*:*:*:*:*:*:*","matchCriteriaId":"2691943C-1FD1-43EE-B070-E35710E426ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.1:*:*:*:*:*:*:*","matchCriteriaId":"5B10D9D9-BC40-4889-9196-C8EA7C571160"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:10.1.0:*:*:*:*:*:*:*","matchCriteriaId":"288EB1AC-9DE3-4FE2-AE4D-006A49199877"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.0:*:*:*:*:*:*:*","matchCriteriaId":"1405D7AE-D14C-40F6-9144-EF2F18A6EBC1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.1:*:*:*:*:*:*:*","matchCriteriaId":"E807E667-0597-4F14-902A-B922C94F572C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.2:*:*:*:*:*:*:*","matchCriteriaId":"02614B4F-0E90-456E-B7ED-387A3007FB45"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.3:*:*:*:*:*:*:*","matchCriteriaId":"F482624A-BE79-4A87-B676-DBB57369D31C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.4:*:*:*:*:*:*:*","matchCriteriaId":"77888947-80CB-46B3-910E-DCCFDF6B3D47"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:11.0.0:*:*:*:*:*:*:*","matchCriteriaId":"3251DB7F-0436-48D5-AF7B-F812237DB926"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"8600FF27-4407-4755-A1E3-5648D9ACCB1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"D3A84AF1-A18E-4AFD-B85E-49CE46A548D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"BA54B88F-4A16-4F40-8A3B-B107F0CA2334"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"17C28542-51A4-4464-ADF9-C6376F829F4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.0:*:*:*:*:*:*:*","matchCriteriaId":"584853F9-644F-40B2-A28F-1CE9B51F84F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:*","matchCriteriaId":"DFE665CF-A633-474E-9519-D20E3D3958CF"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.0:*:*:*:*:*:*:*","matchCriteriaId":"974C5213-99F7-4E8A-AC6A-8759697F19C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.4.1:*:*:*:*:*:*:*","matchCriteriaId":"E288D50B-7EFA-4FC8-938B-EE3765FFA24D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*","matchCriteriaId":"0E3D8A24-0B8D-432B-8F06-D0E1642E7C1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*","matchCriteriaId":"A4489382-0668-4CFB-BA89-D54762937CEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*","matchCriteriaId":"E5B40837-EC2B-41FB-ACC3-806054EAF28C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:10.0.0:*:*:*:*:*:*:*","matchCriteriaId":"E951823B-9791-48C7-A804-18FEBEC31279"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:10.0.1:*:*:*:*:*:*:*","matchCriteriaId":"2E3427DB-2918-4934-A3C1-FA5F1632364F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:10.1.0:*:*:*:*:*:*:*","matchCriteriaId":"78F1A903-4AF5-4FE6-92B0-9F0B64723804"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.0:*:*:*:*:*:*:*","matchCriteriaId":"383966C0-2FDD-4755-BA16-EE73D4577DFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.1:*:*:*:*:*:*:*","matchCriteriaId":"2AD7519A-2F81-42CB-A18A-0BA9DB0F90D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.2:*:*:*:*:*:*:*","matchCriteriaId":"F16F5CB9-3A92-4A96-BC24-993FCF3DC13F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.3:*:*:*:*:*:*:*","matchCriteriaId":"2748B48B-3E2A-4837-981E-5049CF627CBC"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.4:*:*:*:*:*:*:*","matchCriteriaId":"3A2E767A-65BC-420B-9BA3-12B51575FB37"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:11.0.0:*:*:*:*:*:*:*","matchCriteriaId":"E5E8E654-DA20-45F9-A25E-44D1E31F64C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"3C8FCFDA-703B-42DC-91FF-00066E88E49D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"3CA49611-A8E4-454E-98AD-B64C0202838F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FF7FCC81-2F1D-4EF5-956B-085FB7FEFAE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"200A9CE9-E56D-4EFA-AC8A-954F945DDDBB"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_security:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"0303BEA3-02EB-4F7C-96C5-29E231832CEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_security:4.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27CAD4CD-9228-4DE5-A333-2862AC18F24B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_security:4.2.0:*:*:*:*:*:*:*","matchCriteriaId":"283BF2C8-BED6-4FB5-91C0-E53F338F3AF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_security:4.3.0:*:*:*:*:*:*:*","matchCriteriaId":"D98BEE39-FD68-49FC-A2A2-8926FFA4BF51"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_security:4.4.0:*:*:*:*:*:*:*","matchCriteriaId":"0003813A-C1A8-4ED1-A04C-7AE961E7FA22"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:10.1.0:*:*:*:*:*:*:*","matchCriteriaId":"D982EE29-D298-4D39-897A-580D867CDE50"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.0:*:*:*:*:*:*:*","matchCriteriaId":"D477F539-2E79-47BB-A8CF-F3A73AA72A27"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.1:*:*:*:*:*:*:*","matchCriteriaId":"C70B0F91-B269-4753-92E5-69F49CCB498D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.2:*:*:*:*:*:*:*","matchCriteriaId":"44847A70-9301-4C53-93AF-8888CF074F6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.3:*:*:*:*:*:*:*","matchCriteriaId":"57C59A21-CFC9-41CE-AEC3-FD9E8B02A5FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.4:*:*:*:*:*:*:*","matchCriteriaId":"FE109CFC-59FD-4859-87EF-5FDD1BD94260"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:11.0.0:*:*:*:*:*:*:*","matchCriteriaId":"53531CA7-5E47-4C46-BDA5-3B4710085078"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"5A085285-329B-4EF0-ABFB-238655E9E82D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"1591F627-3C86-4904-9236-6936D533ED75"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"3136A8D1-3D0D-46B3-9A3A-737074864F1B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"96673865-3D37-4562-831E-3ACE9DFB471E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_device:4.2.0:*:*:*:*:*:*:*","matchCriteriaId":"EBA4FC82-F8FB-4F11-94DA-12D280A18E3D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_device:4.3.0:*:*:*:*:*:*:*","matchCriteriaId":"CB5D327F-4233-45CE-A557-F7BA717AF057"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_device:4.4.0:*:*:*:*:*:*:*","matchCriteriaId":"99E5F378-E93E-45F6-A445-F2DAB5C423F7"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:*","matchCriteriaId":"65D810F8-6062-4901-9832-226F80287C8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EBC2A0DC-D931-4450-8D0F-3223A8EDCED9"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:10.1.0:*:*:*:*:*:*:*","matchCriteriaId":"E6C19BDD-1286-48C7-8E7D-66C100D02319"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.0:*:*:*:*:*:*:*","matchCriteriaId":"4B4653A4-833F-4381-86E9-452F19A53868"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FFCB7C80-DDA6-421C-92E8-E6E56E414E81"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.2:*:*:*:*:*:*:*","matchCriteriaId":"494085EA-7445-4592-8795-DCC035BDDC52"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.3:*:*:*:*:*:*:*","matchCriteriaId":"EAD4E5E9-5289-4E84-A922-97364D8EB6EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.4:*:*:*:*:*:*:*","matchCriteriaId":"479AFDC6-CE0E-4AAC-8DA9-26ADCD96E8DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:*","matchCriteriaId":"094BD2B6-E269-4647-A77C-B584805B6203"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"45C31572-6C40-4621-AB57-6768DE0D59A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"4617DC7B-07BA-4805-9789-CFDBA8535214"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"A635FEC4-4F52-4971-A67D-47E68108E4F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"EC69B41E-C22D-48D2-8609-60C018F1F48D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:11.4.0:*:*:*:*:*:*:*","matchCriteriaId":"270EEBF6-46FA-48FC-BEC9-9C0838A86BB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:11.4.1:*:*:*:*:*:*:*","matchCriteriaId":"93310708-E1FE-445A-BB1F-7D1F553AEC65"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*","matchCriteriaId":"855E91A4-0A0C-4E5C-8019-FB513A793803"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"7507BDFF-5B52-4A06-9F8C-2B6F3958162A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.0:*:*:*:*:*:*:*","matchCriteriaId":"6E0141FA-44E9-460E-B175-29A7FA251301"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.4.1:*:*:*:*:*:*:*","matchCriteriaId":"8DD27EF7-3329-4009-959F-D2E4D5935E57"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*","matchCriteriaId":"3755740D-F1DC-4910-ADDD-9D491515201C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*","matchCriteriaId":"EA244A7D-F65D-4114-81C8-CE811959EA10"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.0.0:*:*:*:*:*:*:*","matchCriteriaId":"8FA5C323-7247-42B5-AF3E-F7E8A18932CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"FF199950-9564-4CF2-BC74-F9E1C28AC377"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"A613D29A-9C7F-49A5-98E4-8477A1FF7C9E"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"867B2CA9-DAE5-4070-B8E6-F624C59F5054"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"52CD200C-1D14-471F-93C1-027CC676C26C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.4.0:*:*:*:*:*:*:*","matchCriteriaId":"4D1850CE-D20D-4677-8CF2-1DB3A4EB33F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.4.1:*:*:*:*:*:*:*","matchCriteriaId":"0A70B1E2-0B3D-4DE9-8ED9-777F73D0B750"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*","matchCriteriaId":"A7D226F1-6513-4233-BE20-58D7AB24978F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*","matchCriteriaId":"B33B2082-E040-4799-A260-BA687ED8614E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_cloud:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"D88F8F3B-DD8B-4BB3-BB68-C43583318400"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_cloud:4.1.0:*:*:*:*:*:*:*","matchCriteriaId":"F677AF16-146D-41A5-ABF3-56DB9C0D6CA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_cloud:4.2.0:*:*:*:*:*:*:*","matchCriteriaId":"CE13DA9F-8460-430E-B939-BF17A7D37A9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_cloud:4.3.0:*:*:*:*:*:*:*","matchCriteriaId":"70A04EB1-0C2C-4FC0-9E4D-05AFE65503D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_cloud:4.4.0:*:*:*:*:*:*:*","matchCriteriaId":"CF93E82F-D38C-4D4D-99EB-E334EE163C4E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.0:*:*:*:*:*:*:*","matchCriteriaId":"FB441DC5-813E-4E59-87B8-15731291B135"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.1:*:*:*:*:*:*:*","matchCriteriaId":"F89F4A12-710E-4F7A-9A8D-D8B91889A279"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.1.0:*:*:*:*:*:*:*","matchCriteriaId":"126AD92E-6816-42C0-8801-A81B59C11A56"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.0:*:*:*:*:*:*:*","matchCriteriaId":"890F363A-FC4F-4F52-BBFF-E959F65043A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.1:*:*:*:*:*:*:*","matchCriteriaId":"4CE899AF-EA61-4B9D-9523-BF436614CE21"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.2:*:*:*:*:*:*:*","matchCriteriaId":"E5BA7D7A-02C8-411A-AFBF-D523E57A66C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.3:*:*:*:*:*:*:*","matchCriteriaId":"0018A0C0-AFB3-4654-9504-78A2742C6EE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.4:*:*:*:*:*:*:*","matchCriteriaId":"3A1ACF2F-3C0E-42E1-A1D2-6D682B2E32C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.0.0:*:*:*:*:*:*:*","matchCriteriaId":"C14D0DD3-E6A9-43C8-85D7-6DBB16E30DD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"2B59396A-EAFF-41D4-874F-4CA91D901807"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"4C9C14C5-B23C-4CE3-8FF0-52741CBB602E"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"7FBA20ED-08F5-4C35-991A-0DBC6BEAECC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.3.0:*:*:*:*:*:*:*","matchCriteriaId":"8D94751C-A340-4DE7-821A-5143FA0011E4"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"8730","Ordinal":"1","Title":"CVE-2014-8730","CVE":"CVE-2014-8730","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"8730","Ordinal":"1","NoteData":"The SSL profiles component in F5 BIG-IP LTM, APM, and ASM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, AAM 11.4.0 through 11.5.1, AFM 11.3.0 through 11.5.1, Analytics 11.0.0 through 11.5.1, Edge Gateway, WebAccelerator, and WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, PEM 11.3.0 through 11.6.0, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.4.1 and BIG-IQ Cloud and Security 4.0.0 through 4.4.0 and Device 4.2.0 through 4.4.0, when using TLS 1.x before TLS 1.2, does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).  NOTE: the scope of this identifier is limited to the F5 implementation only. Other vulnerable implementations should receive their own CVE ID, since this is not a vulnerability within the design of TLS 1.x itself.","Type":"Description","Title":"CVE-2014-8730"},{"CveYear":"2014","CveId":"8730","Ordinal":"2","NoteData":"2014-12-09","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"8730","Ordinal":"3","NoteData":"2016-12-30","Type":"Other","Title":"Modified"}]}}}