{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"BIG-IP APM versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP DNS versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP Advanced WAF/ASM versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1","product":{"name":"BIG-IP","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP Next for Kubernetes versions 2.x ant\u00e9rieures \u00e0 2.2.0","product":{"name":"BIG-IP Next","vendor":{"name":"F5","scada":false}}},{"description":"F5 DoS for NGINX versions 4.8.0","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP versions 16.1.0 \u00e0 16.1.6 ant\u00e9rieures \u00e0 17.1.3","product":{"name":"BIG-IP","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP DNS versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 21.0.0","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP Next SPK versions 1.7.0 \u00e0 1.7.16 ant\u00e9rieures \u00e0 1.7.17","product":{"name":"BIG-IP Next","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.2","product":{"name":"BIG-IP","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP SSL Orchestrator versions 21.0.0 ant\u00e9rieures \u00e0 21.0.0.1 (SSL Orchestrator 13.1.3)","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP Next SPK versions 2.0.0 \u00e0 2.0.2 ant\u00e9rieures \u00e0 2.0.3","product":{"name":"BIG-IP Next","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Open Source versions 1.0.0 \u00e0 1.30.0 ant\u00e9rieures \u00e0 1.30.1","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Gateway Fabric versions 1.3.0 \u00e0 1.6.2","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP Next CNF versions 2.0.0 \u00e0 2.0.2 ant\u00e9rieures \u00e0 2.0.3","product":{"name":"BIG-IP Next","vendor":{"name":"F5","scada":false}}},{"description":"NGINX App Protect DoS versions 4.3.0 \u00e0 4.7.0","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP APM versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"NGINX App Protect WAF versions 4.9.0 \u00e0 4.16.0","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP SSL Orchestrator versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1 (SSL Orchestrator 12.3.2)","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Ingress Controller versions 5.0.0 \u00e0 5.4.2","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 21.0.0.2","product":{"name":"BIG-IP","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Ingress Controller versions 3.5.0 \u00e0 3.7.2","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Open Source versions 0.3.50 \u00e0 0.9.7 ant\u00e9rieures \u00e0 1.30.1","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP DNS versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Instance Manager versions 2.16.0 \u00e0 2.21.1","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Plus versions R36 ant\u00e9rieures \u00e0 R36 P4","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IQ Centralized Management versions 8.4.0 ant\u00e9rieures \u00e0 8.4.1","product":{"name":"BIG-IQ","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP SSL Orchestrator versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4 (SSL Orchestrator 12.3.2)","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP Next CNF versions 1.1.0 \u00e0 1.4.0 ant\u00e9rieures \u00e0 1.4.1","product":{"name":"BIG-IP Next","vendor":{"name":"F5","scada":false}}},{"description":"NGINX App Protect WAF versions 5.1.0 \u00e0 5.8.0","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Gateway Fabric versions 2.0.0 \u00e0 2.6.0","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Ingress Controller versions 4.0.0 \u00e0 4.0.1","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP PEM versions 17.1.0 \u00e0 17.1.3 ant\u00e9rieures \u00e0 17.1.3.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP APM versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP DNS versions 16.1.0 \u00e0 16.1.6 ant\u00e9rieures \u00e0 17.1.3.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP PEM versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP Advanced WAF/ASM versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP Advanced WAF/ASM versions 21.0.x ant\u00e9rieures \u00e0 21.0.0.1","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"BIG-IP PEM versions 17.5.0 \u00e0 17.5.1 ant\u00e9rieures \u00e0 17.5.1.4","product":{"name":"N/A","vendor":{"name":"F5","scada":false}}},{"description":"NGINX Plus versions R32 ant\u00e9rieures \u00e0 R32 P6","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}},{"description":"F5 WAF for NGINX versions 5.9.0 \u00e0 5.12.1","product":{"name":"NGINX","vendor":{"name":"F5","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2026-41227","url":"https://www.cve.org/CVERecord?id=CVE-2026-41227"},{"name":"CVE-2026-39458","url":"https://www.cve.org/CVERecord?id=CVE-2026-39458"},{"name":"CVE-2026-42781","url":"https://www.cve.org/CVERecord?id=CVE-2026-42781"},{"name":"CVE-2026-42780","url":"https://www.cve.org/CVERecord?id=CVE-2026-42780"},{"name":"CVE-2026-40701","url":"https://www.cve.org/CVERecord?id=CVE-2026-40701"},{"name":"CVE-2026-42920","url":"https://www.cve.org/CVERecord?id=CVE-2026-42920"},{"name":"CVE-2026-42409","url":"https://www.cve.org/CVERecord?id=CVE-2026-42409"},{"name":"CVE-2026-42946","url":"https://www.cve.org/CVERecord?id=CVE-2026-42946"},{"name":"CVE-2026-42937","url":"https://www.cve.org/CVERecord?id=CVE-2026-42937"},{"name":"CVE-2026-42919","url":"https://www.cve.org/CVERecord?id=CVE-2026-42919"},{"name":"CVE-2026-42934","url":"https://www.cve.org/CVERecord?id=CVE-2026-42934"},{"name":"CVE-2026-42406","url":"https://www.cve.org/CVERecord?id=CVE-2026-42406"},{"name":"CVE-2026-40435","url":"https://www.cve.org/CVERecord?id=CVE-2026-40435"},{"name":"CVE-2026-34176","url":"https://www.cve.org/CVERecord?id=CVE-2026-34176"},{"name":"CVE-2026-40629","url":"https://www.cve.org/CVERecord?id=CVE-2026-40629"},{"name":"CVE-2026-32673","url":"https://www.cve.org/CVERecord?id=CVE-2026-32673"},{"name":"CVE-2026-41953","url":"https://www.cve.org/CVERecord?id=CVE-2026-41953"},{"name":"CVE-2026-40061","url":"https://www.cve.org/CVERecord?id=CVE-2026-40061"},{"name":"CVE-2026-42924","url":"https://www.cve.org/CVERecord?id=CVE-2026-42924"},{"name":"CVE-2026-41225","url":"https://www.cve.org/CVERecord?id=CVE-2026-41225"},{"name":"CVE-2026-35062","url":"https://www.cve.org/CVERecord?id=CVE-2026-35062"},{"name":"CVE-2026-40423","url":"https://www.cve.org/CVERecord?id=CVE-2026-40423"},{"name":"CVE-2026-34019","url":"https://www.cve.org/CVERecord?id=CVE-2026-34019"},{"name":"CVE-2026-42926","url":"https://www.cve.org/CVERecord?id=CVE-2026-42926"},{"name":"CVE-2026-20916","url":"https://www.cve.org/CVERecord?id=CVE-2026-20916"},{"name":"CVE-2026-41957","url":"https://www.cve.org/CVERecord?id=CVE-2026-41957"},{"name":"CVE-2026-39455","url":"https://www.cve.org/CVERecord?id=CVE-2026-39455"},{"name":"CVE-2026-40618","url":"https://www.cve.org/CVERecord?id=CVE-2026-40618"},{"name":"CVE-2026-40631","url":"https://www.cve.org/CVERecord?id=CVE-2026-40631"},{"name":"CVE-2026-32643","url":"https://www.cve.org/CVERecord?id=CVE-2026-32643"},{"name":"CVE-2026-41217","url":"https://www.cve.org/CVERecord?id=CVE-2026-41217"},{"name":"CVE-2026-40698","url":"https://www.cve.org/CVERecord?id=CVE-2026-40698"},{"name":"CVE-2026-39459","url":"https://www.cve.org/CVERecord?id=CVE-2026-39459"},{"name":"CVE-2026-40703","url":"https://www.cve.org/CVERecord?id=CVE-2026-40703"},{"name":"CVE-2026-28758","url":"https://www.cve.org/CVERecord?id=CVE-2026-28758"},{"name":"CVE-2026-41954","url":"https://www.cve.org/CVERecord?id=CVE-2026-41954"},{"name":"CVE-2026-40699","url":"https://www.cve.org/CVERecord?id=CVE-2026-40699"},{"name":"CVE-2026-40462","url":"https://www.cve.org/CVERecord?id=CVE-2026-40462"},{"name":"CVE-2026-41219","url":"https://www.cve.org/CVERecord?id=CVE-2026-41219"},{"name":"CVE-2026-24464","url":"https://www.cve.org/CVERecord?id=CVE-2026-24464"},{"name":"CVE-2026-40067","url":"https://www.cve.org/CVERecord?id=CVE-2026-40067"},{"name":"CVE-2026-42063","url":"https://www.cve.org/CVERecord?id=CVE-2026-42063"},{"name":"CVE-2026-42408","url":"https://www.cve.org/CVERecord?id=CVE-2026-42408"},{"name":"CVE-2026-40060","url":"https://www.cve.org/CVERecord?id=CVE-2026-40060"},{"name":"CVE-2026-42945","url":"https://www.cve.org/CVERecord?id=CVE-2026-42945"},{"name":"CVE-2026-41956","url":"https://www.cve.org/CVERecord?id=CVE-2026-41956"},{"name":"CVE-2026-41218","url":"https://www.cve.org/CVERecord?id=CVE-2026-41218"},{"name":"CVE-2026-41959","url":"https://www.cve.org/CVERecord?id=CVE-2026-41959"},{"name":"CVE-2026-42930","url":"https://www.cve.org/CVERecord?id=CVE-2026-42930"},{"name":"CVE-2026-40460","url":"https://www.cve.org/CVERecord?id=CVE-2026-40460"},{"name":"CVE-2026-42058","url":"https://www.cve.org/CVERecord?id=CVE-2026-42058"}],"links":[],"reference":"CERTFR-2026-AVI-0591","revisions":[{"description":"Version initiale","revision_date":"2026-05-15T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits F5. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits F5","vendor_advisories":[{"published_at":"2026-05-13","title":"Bulletin de s\u00e9curit\u00e9 F5 K000160932","url":"https://my.f5.com/manage/s/article/K000160932"}]}
