SB2026051448 - Multiple vulnerabilities in BIG-IP



SB2026051448 - Multiple vulnerabilities in BIG-IP

Published: May 14, 2026

Security Bulletin ID SB2026051448
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2026-40067)

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to buffer copy without checking size of input in SessionDB when processing undisclosed traffic on a virtual server with a BIG-IP APM access policy configured. A remote attacker can send crafted traffic to cause a denial of service.

There is no control plane exposure; this is a data plane issue only.


2) Cross-site request forgery (CVE-ID: CVE-2026-40703)

The vulnerability allows a remote attacker to perform unauthorized create, modify, and delete actions on the dashboard.

The vulnerability exists due to cross-site request forgery in the configuration utility dashboard when handling crafted requests from an authenticated user's browser. A remote attacker can cause an authenticated user to send a crafted request to perform unauthorized create, modify, and delete actions on the dashboard.

This is a control plane issue; there is no data plane exposure.


3) Stack-based buffer overflow (CVE-ID: CVE-2026-42919)

The vulnerability allows a remote user to escalate privileges.

The vulnerability exists due to stack-based buffer overflow in BIG-IP external monitors when handling administrative access to Appliance mode functionality. A remote privileged user can execute arbitrary system commands to escalate privileges.

This is a control plane issue only and there is no data plane exposure.


Remediation

Install update from vendor's website.