Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K000160857 |
|
Wed, 13 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
| Title | Knowledge Appliance mode iControl REST vulnerability | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2026-05-13T16:10:41.048Z
Reserved: 2026-04-30T23:04:19.989Z
Link: CVE-2026-34176
Updated: 2026-05-13T16:10:36.586Z
Status : Awaiting Analysis
Published: 2026-05-13T16:16:39.813
Modified: 2026-05-13T16:27:11.127
Link: CVE-2026-34176
No data.
OpenCVE Enrichment
Updated: 2026-05-13T16:45:44Z