Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Oct 2025 08:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 04:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 30 Jul 2025 11:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Fri, 14 Feb 2025 02:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated |
Tue, 11 Feb 2025 08:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 04 Feb 2025 02:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2025-10-21T23:05:33.431Z
Reserved: 2023-10-25T18:51:34.198Z
Link: CVE-2023-46747
Updated: 2024-08-02T20:53:21.594Z
Status : Analyzed
Published: 2023-10-26T21:15:08.097
Modified: 2025-10-27T17:07:09.063
Link: CVE-2023-46747
No data.
OpenCVE Enrichment
No data.