Known vulnerabilities in F5 Networks APM Clients 7.1.8

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › F5 Networks › APM Clients › 7.1.8

Known vulnerabilities in F5 Networks APM Clients 7.1.8

Vendor: F5 Networks
Website: https://f5.com/
Total Security Bulletins: 9
7.2.4.8 7.2.4.7 7.2.4.6 7.2.5 7.2.4.4 7.2.4.14 7.1.4 7.1.3 7.1.2 7.1.1 7.1.0 7.2.4 7.2.3.1 7.2.2 7.2.1.3 7.2.1.4 - 7.2.4.5 7.2.4.3 7.2.3 7.1.9.9 7.2.1.2 7.1.9.8 7.1.8.55 7.1.9.85 7.2.1.15 7.1.8.5 7.2.1.1 7.2.1 7.2.0 7.1.9 7.1.8 7.1.7.2 7.1.7 7.1.6 7.1.5

Security bulletins (9)

Secuity bulletin Severity Status Published
SB2023020613: Privilege escalation in BIG-IP Edge Client for Windows Low
Patched
06.02.2023
SB2021042920: Privilege escalation in APM Clients for Windows Low
Patched
29.04.2021
SB2021031020: Information disclosure in F5 BIG-IP APM Low
Patched
10.03.2021
SB2021021109: Insecure DLL loading in BIG-IP APM CTU High
Patched
11.02.2021
SB2021011411: OpenSSL vulnerability in multiple F5 products Medium
Not patched
14.01.2021
SB2020051318: Privilege escalation in F5 BIG-IP APM, BIG-IP APM Client and BIG-IP Edge Gateway Low
Patched
13.05.2020
SB2020051317: Multiple vulnerabilities in F5 BIG-IP APM and BIG-IP APM Clients High
Not patched
13.05.2020
SB2020043023: Man-in-the-Middle (MitM) attack in F5 BIG-IP APM and APM Clients Low
Patched
30.04.2020
SB2020020604: Improper Authentication in F5 BIG-IP Edge Client for Windows Low
Not patched
06.02.2020

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or