{
    "document": {
        "category": "csaf_security_advisory",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "nl",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            },
            {
                "category": "description",
                "text": "F5 heeft meerdere kwetsbaarheden verholpen in de BIG-IP en BIG-IQ productlijnen, inclusief componenten zoals iControl REST, iControl SOAP, TMOS Shell, Traffic Management Microkernel (TMM), Configuration utility, Advanced WAF, ASM, PEM, DNS, Access Policy Manager (APM) en SSL Orchestrator.",
                "title": "Feiten"
            },
            {
                "category": "description",
                "text": "De kwetsbaarheden betreffen onder andere directory traversal, ongeautoriseerde bestandswijzigingen, blootstelling van gevoelige SSH-wachtwoorden in API-responses en auditlogs, privilege escalatie via onjuiste permissie-toewijzingen, remote command injection, cross-account informatielekken, en onverwachte procesafsluitingen (zoals van TMM, httpd, apmd en bd processen) door specifieke configuraties of ongedocumenteerde verkeerspatronen.\n\nExploitatie vereist doorgaans geauthenticeerde toegang met rollen variërend van Manager, Resource Administrator tot Administrator, afhankelijk van de kwetsbaarheid. Sommige kwetsbaarheden maken het mogelijk om configuratieobjecten te wijzigen, wat kan leiden tot het uitvoeren van willekeurige commando's met verhoogde privileges.\n\nAndere kwetsbaarheden betreffen het lekken van gevoelige informatie via onjuiste toegangscontrole of onvoldoende validatie binnen managementinterfaces. Diverse kwetsbaarheden zijn specifiek voor Appliance mode of bepaalde configuratieprofielen zoals SSL, HTTP/2, SIP, LDAP authenticatie, en SNMP configuraties. De impact omvat onder meer het omzeilen van beveiligingscontroles, het escaleren van privileges, het lekken van gevoelige gegevens, en het verstoren van de beschikbaarheid en stabiliteit van netwerk- en applicatiebeheercomponenten. Niet-ondersteunde softwareversies zijn in de meeste gevallen niet geëvalueerd voor deze kwetsbaarheden.",
                "title": "Interpretaties"
            },
            {
                "category": "description",
                "text": "F5 heeft updates uitgebracht om de kwetsbaarheden in de BIG-IP en BIG-IQ producten te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
                "title": "Oplossingen"
            },
            {
                "category": "general",
                "text": "medium",
                "title": "Kans"
            },
            {
                "category": "general",
                "text": "high",
                "title": "Schade"
            },
            {
                "category": "general",
                "text": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
                "title": "CWE-22"
            },
            {
                "category": "general",
                "text": "Path Traversal: '.../...//'",
                "title": "CWE-35"
            },
            {
                "category": "general",
                "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                "title": "CWE-77"
            },
            {
                "category": "general",
                "text": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
                "title": "CWE-78"
            },
            {
                "category": "general",
                "text": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
                "title": "CWE-120"
            },
            {
                "category": "general",
                "text": "Stack-based Buffer Overflow",
                "title": "CWE-121"
            },
            {
                "category": "general",
                "text": "Incorrect Calculation of Buffer Size",
                "title": "CWE-131"
            },
            {
                "category": "general",
                "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                "title": "CWE-200"
            },
            {
                "category": "general",
                "text": "Execution with Unnecessary Privileges",
                "title": "CWE-250"
            },
            {
                "category": "general",
                "text": "Unchecked Return Value",
                "title": "CWE-252"
            },
            {
                "category": "general",
                "text": "Incorrect Privilege Assignment",
                "title": "CWE-266"
            },
            {
                "category": "general",
                "text": "Privilege Defined With Unsafe Actions",
                "title": "CWE-267"
            },
            {
                "category": "general",
                "text": "Least Privilege Violation",
                "title": "CWE-272"
            },
            {
                "category": "general",
                "text": "Cleartext Storage of Sensitive Information",
                "title": "CWE-312"
            },
            {
                "category": "general",
                "text": "Cross-Site Request Forgery (CSRF)",
                "title": "CWE-352"
            },
            {
                "category": "general",
                "text": "Use After Free",
                "title": "CWE-416"
            },
            {
                "category": "general",
                "text": "Unprotected Alternate Channel",
                "title": "CWE-420"
            },
            {
                "category": "general",
                "text": "NULL Pointer Dereference",
                "title": "CWE-476"
            },
            {
                "category": "general",
                "text": "Deserialization of Untrusted Data",
                "title": "CWE-502"
            },
            {
                "category": "general",
                "text": "Insertion of Sensitive Information into Log File",
                "title": "CWE-532"
            },
            {
                "category": "general",
                "text": "Files or Directories Accessible to External Parties",
                "title": "CWE-552"
            },
            {
                "category": "general",
                "text": "Improper Neutralization of Data within XPath Expressions ('XPath Injection')",
                "title": "CWE-643"
            },
            {
                "category": "general",
                "text": "Incorrect Use of Privileged APIs",
                "title": "CWE-648"
            },
            {
                "category": "general",
                "text": "Incorrect Permission Assignment for Critical Resource",
                "title": "CWE-732"
            },
            {
                "category": "general",
                "text": "Allocation of Resources Without Limits or Throttling",
                "title": "CWE-770"
            },
            {
                "category": "general",
                "text": "Missing Release of Resource after Effective Lifetime",
                "title": "CWE-772"
            },
            {
                "category": "general",
                "text": "Access of Uninitialized Pointer",
                "title": "CWE-824"
            },
            {
                "category": "general",
                "text": "Loop with Unreachable Exit Condition ('Infinite Loop')",
                "title": "CWE-835"
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "Nationaal Cyber Security Centrum",
            "namespace": "https://www.ncsc.nl/"
        },
        "references": [
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160975"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160979"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160981"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000161018"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000161022"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000161023"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000161040"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000161056"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000161107"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000149743"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000156581"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000156604"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000156761"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000156734"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000157895"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000157981"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000158038"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000158070"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000158082"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000158971"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000158978"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000158979"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000159021"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000159034"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160727"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160788"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160857"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160862"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160863"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160874"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160875"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160876"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160901"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160903"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160911"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160916"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160926"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160945"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160971"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160972"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://my.f5.com/manage/s/article/K000160973"
            }
        ],
        "title": "Kwetsbaarheden verholpen in F5 BIG-IP en BIG-IQ producten",
        "tracking": {
            "current_release_date": "2026-05-15T12:07:48.313135Z",
            "generator": {
                "date": "2025-08-04T16:30:00Z",
                "engine": {
                    "name": "V.A.",
                    "version": "1.3"
                }
            },
            "id": "NCSC-2026-0162",
            "initial_release_date": "2026-05-15T12:07:48.313135Z",
            "revision_history": [
                {
                    "date": "2026-05-15T12:07:48.313135Z",
                    "number": "1.0.0",
                    "summary": "Initiele versie"
                }
            ],
            "status": "final",
            "version": "1.0.0"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-1"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "AI Gateway"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-2"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-3"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP APM"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-4"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP Advanced WAF/ASM"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-5"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP Advanced WAF/ASM and BIG-IP DDoS Hybrid Defender"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-6"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP DNS"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-7"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP Next CNF"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-8"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP Next SPK"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-9"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP Next for Kubernetes"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-10"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP PEM"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-11"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP SSL Orchestrator"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-12"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP tenants on BX110 blades on VELOS"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-13"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP tenants on BX520 blades on VELOS"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-14"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP tenants on all other  rSeries systems"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-15"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP tenants on r10000 rSeries"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-16"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP tenants on r12000 rSeries"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-17"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IP tenants on r5000 rSeries"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-18"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IQ"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-19"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BIG-IQ Centralized Management"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-20"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Distributed Cloud (all services)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-21"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "NGINX (all products)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-22"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "OS-A"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-23"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "OS-C"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-24"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "SSL Orchestrator"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-25"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Silverline (all services)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-26"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Traffix SDC"
                    }
                ],
                "category": "vendor",
                "name": "F5"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2026-24464",
            "cwe": {
                "id": "CWE-35",
                "name": "Path Traversal: '.../...//'"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Path Traversal: '.../...//'",
                    "title": "CWE-35"
                },
                {
                    "category": "description",
                    "text": "A directory traversal vulnerability in an undisclosed iControl REST endpoint in Appliance mode may allow an authenticated administrator to bypass security boundaries and delete files.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-24464 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-24464.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
                        "baseScore": 6.8,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-24464"
        },
        {
            "cve": "CVE-2026-28758",
            "cwe": {
                "id": "CWE-312",
                "name": "Cleartext Storage of Sensitive Information"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Cleartext Storage of Sensitive Information",
                    "title": "CWE-312"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in BIG-IP DNS's gtm_add and bigip_add iControl REST commands exposes the ssh-password parameter in cleartext within responses and audit logs, risking sensitive information disclosure to highly privileged attackers.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-28758 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28758.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 4.4,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-28758"
        },
        {
            "cve": "CVE-2026-32643",
            "cwe": {
                "id": "CWE-250",
                "name": "Execution with Unnecessary Privileges"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Execution with Unnecessary Privileges",
                    "title": "CWE-250"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in BIG-IP and BIG-IQ systems allows a highly privileged, authenticated attacker with at least the Certificate Manager role to modify configuration objects and execute arbitrary commands, excluding versions past End of Technical Support.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-32643 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-32643.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-32643"
        },
        {
            "cve": "CVE-2026-32673",
            "cwe": {
                "id": "CWE-250",
                "name": "Execution with Unnecessary Privileges"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Execution with Unnecessary Privileges",
                    "title": "CWE-250"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in BIG-IP scripted monitors allows authenticated users with Resource Administrator or Administrator roles to execute arbitrary system commands with elevated privileges, potentially crossing security boundaries in appliance mode.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-32673 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-32673.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-32673"
        },
        {
            "cve": "CVE-2026-34176",
            "cwe": {
                "id": "CWE-78",
                "name": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
                    "title": "CWE-78"
                },
                {
                    "category": "description",
                    "text": "An authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint in Appliance mode, potentially allowing an attacker to cross security boundaries.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-34176 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34176.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-34176"
        },
        {
            "cve": "CVE-2026-35062",
            "cwe": {
                "id": "CWE-266",
                "name": "Incorrect Privilege Assignment"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incorrect Privilege Assignment",
                    "title": "CWE-266"
                },
                {
                    "category": "description",
                    "text": "An authenticated iControl SOAP user may be able to access or obtain information from other accounts, with versions past End of Technical Support not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-35062 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-35062.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-35062"
        },
        {
            "cve": "CVE-2026-39455",
            "cwe": {
                "id": "CWE-772",
                "name": "Missing Release of Resource after Effective Lifetime"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Missing Release of Resource after Effective Lifetime",
                    "title": "CWE-772"
                },
                {
                    "category": "description",
                    "text": "Configuring the BIG-IP Configuration utility to use LDAP authentication can cause the httpd process to exhaust available file descriptors due to undisclosed traffic, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-39455 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-39455.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-39455"
        },
        {
            "cve": "CVE-2026-39458",
            "cwe": {
                "id": "CWE-824",
                "name": "Access of Uninitialized Pointer"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Access of Uninitialized Pointer",
                    "title": "CWE-824"
                },
                {
                    "category": "description",
                    "text": "Enabling a BIG-IP DNS profile with DNS cache on a virtual server can cause the Traffic Management Microkernel (TMM) to terminate due to undisclosed traffic, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-39458 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-39458.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-39458"
        },
        {
            "cve": "CVE-2026-39459",
            "cwe": {
                "id": "CWE-272",
                "name": "Least Privilege Violation"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Least Privilege Violation",
                    "title": "CWE-272"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in iControl REST and TMOS Shell (tmsh) allows a highly privileged, authenticated attacker with at least Manager role to create configuration objects that enable execution of arbitrary commands.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-39459 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-39459.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.2,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-39459"
        },
        {
            "cve": "CVE-2026-40060",
            "cwe": {
                "id": "CWE-252",
                "name": "Unchecked Return Value"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Unchecked Return Value",
                    "title": "CWE-252"
                },
                {
                    "category": "description",
                    "text": "Certain undisclosed requests can cause the bd process to terminate when a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40060 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40060.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40060"
        },
        {
            "cve": "CVE-2026-40061",
            "cwe": {
                "id": "CWE-77",
                "name": "Improper Neutralization of Special Elements used in a Command ('Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                    "title": "CWE-77"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in BIG-IP DNS allows authenticated Resource Administrator or Administrator users to execute arbitrary system commands with elevated privileges, potentially crossing security boundaries in Appliance mode.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40061 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40061.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40061"
        },
        {
            "cve": "CVE-2026-40067",
            "cwe": {
                "id": "CWE-120",
                "name": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
                    "title": "CWE-120"
                },
                {
                    "category": "description",
                    "text": "Configuring a BIG-IP APM access policy on a virtual server can cause the apmd process to terminate due to undisclosed traffic, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40067 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40067.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40067"
        },
        {
            "cve": "CVE-2026-40423",
            "cwe": {
                "id": "CWE-770",
                "name": "Allocation of Resources Without Limits or Throttling"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Allocation of Resources Without Limits or Throttling",
                    "title": "CWE-770"
                },
                {
                    "category": "description",
                    "text": "Configuring a SIP profile on a virtual server can cause the Traffic Management Microkernel (TMM) to terminate due to undisclosed traffic, with issues noted in software versions beyond End of Technical Support (EoTS).",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40423 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40423.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40423"
        },
        {
            "cve": "CVE-2026-40435",
            "cwe": {
                "id": "CWE-420",
                "name": "Unprotected Alternate Channel"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Unprotected Alternate Channel",
                    "title": "CWE-420"
                },
                {
                    "category": "description",
                    "text": "IP-based access restrictions configured for httpd do not apply to all endpoints, potentially allowing connections from blocked IP addresses, except in versions that have reached End of Technical Support.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40435 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40435.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                        "baseScore": 5.3,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40435"
        },
        {
            "cve": "CVE-2026-40462",
            "cwe": {
                "id": "CWE-732",
                "name": "Incorrect Permission Assignment for Critical Resource"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incorrect Permission Assignment for Critical Resource",
                    "title": "CWE-732"
                },
                {
                    "category": "description",
                    "text": "Incorrect permission assignment vulnerabilities in iControl REST and TMOS Shell (tmsh) undisclosed commands may allow authenticated attackers to access sensitive information.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40462 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40462.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40462"
        },
        {
            "cve": "CVE-2026-40618",
            "cwe": {
                "id": "CWE-131",
                "name": "Incorrect Calculation of Buffer Size"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incorrect Calculation of Buffer Size",
                    "title": "CWE-131"
                },
                {
                    "category": "description",
                    "text": "Configuring an SSL profile on BIG-IP Virtual Edition without Intel QAT or on hardware with crypto.hwacceleration disabled can cause the Traffic Management Microkernel (TMM) to terminate when processing certain undisclosed traffic.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40618 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40618.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40618"
        },
        {
            "cve": "CVE-2026-40629",
            "cwe": {
                "id": "CWE-770",
                "name": "Allocation of Resources Without Limits or Throttling"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Allocation of Resources Without Limits or Throttling",
                    "title": "CWE-770"
                },
                {
                    "category": "description",
                    "text": "Configuring SSL profiles on a virtual server can cause the server to stop processing new client connections when handling undisclosed traffic, with versions beyond End of Technical Support not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40629 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40629.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40629"
        },
        {
            "cve": "CVE-2026-40631",
            "cwe": {
                "id": "CWE-552",
                "name": "Files or Directories Accessible to External Parties"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Files or Directories Accessible to External Parties",
                    "title": "CWE-552"
                },
                {
                    "category": "description",
                    "text": "An authenticated attacker with Resource Administrator or Administrator roles can exploit iControl SOAP to modify configuration objects and escalate privileges, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40631 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40631.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40631"
        },
        {
            "cve": "CVE-2026-40698",
            "cwe": {
                "id": "CWE-77",
                "name": "Improper Neutralization of Special Elements used in a Command ('Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                    "title": "CWE-77"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in F5 BIG-IP and BIG-IQ systems allows a highly privileged, authenticated attacker with Resource Administrator role to create SNMP configuration objects via iControl REST or TMOS shell, resulting in privilege escalation.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40698 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40698.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40698"
        },
        {
            "cve": "CVE-2026-40699",
            "cwe": {
                "id": "CWE-643",
                "name": "Improper Neutralization of Data within XPath Expressions ('XPath Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Data within XPath Expressions ('XPath Injection')",
                    "title": "CWE-643"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in undisclosed pages of the Configuration utility may allow a low-privileged authenticated attacker to access sensitive information, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40699 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40699.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40699"
        },
        {
            "cve": "CVE-2026-40703",
            "cwe": {
                "id": "CWE-352",
                "name": "Cross-Site Request Forgery (CSRF)"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Cross-Site Request Forgery (CSRF)",
                    "title": "CWE-352"
                },
                {
                    "category": "description",
                    "text": "A cross-site request forgery (CSRF) vulnerability exists in the dashboard of the BIG-IP Configuration utility, with versions that have reached End of Technical Support (EoTS) not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40703 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40703.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                        "baseScore": 5.4,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-40703"
        },
        {
            "cve": "CVE-2026-41217",
            "cwe": {
                "id": "CWE-732",
                "name": "Incorrect Permission Assignment for Critical Resource"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incorrect Permission Assignment for Critical Resource",
                    "title": "CWE-732"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in an undisclosed BIG-IP TMOS Shell command allows authenticated users with resource administrator or administrator roles to execute arbitrary system commands with elevated privileges, potentially crossing security boundaries in Appliance mode.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41217 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41217.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 7.9,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41217"
        },
        {
            "cve": "CVE-2026-41218",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "Configuring BIG-IP PEM iRules with certain commands on a virtual server can cause the Traffic Management Microkernel (TMM) to terminate, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41218 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41218.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41218"
        },
        {
            "cve": "CVE-2026-41219",
            "cwe": {
                "id": "CWE-532",
                "name": "Insertion of Sensitive Information into Log File"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Insertion of Sensitive Information into Log File",
                    "title": "CWE-532"
                },
                {
                    "category": "description",
                    "text": "An improper sanitization vulnerability in the BIG-IP QKView utility allows low-privileged attackers to read sensitive information from QKView files, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41219 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41219.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41219"
        },
        {
            "cve": "CVE-2026-41225",
            "cwe": {
                "id": "CWE-648",
                "name": "Incorrect Use of Privileged APIs"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incorrect Use of Privileged APIs",
                    "title": "CWE-648"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in iControl REST allows a highly privileged, authenticated attacker with at least Manager role to create configuration objects that enable arbitrary command execution.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41225 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41225.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                        "baseScore": 9.1,
                        "baseSeverity": "CRITICAL"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41225"
        },
        {
            "cve": "CVE-2026-41227",
            "cwe": {
                "id": "CWE-770",
                "name": "Allocation of Resources Without Limits or Throttling"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Allocation of Resources Without Limits or Throttling",
                    "title": "CWE-770"
                },
                {
                    "category": "description",
                    "text": "Certain undisclosed traffic on an HTTP/2 virtual server with Layer 7 DoS Protection can increase memory usage and cause the Traffic Management Microkernel (TMM) process to terminate.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41227 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41227.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41227"
        },
        {
            "cve": "CVE-2026-41953",
            "cwe": {
                "id": "CWE-77",
                "name": "Improper Neutralization of Special Elements used in a Command ('Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                    "title": "CWE-77"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in BIG-IP systems enables a highly privileged, authenticated attacker with at least Resource Administrator role to modify configuration objects, resulting in privilege escalation.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41953 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41953.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41953"
        },
        {
            "cve": "CVE-2026-41954",
            "notes": [
                {
                    "category": "description",
                    "text": "A sensitive information disclosure vulnerability in an undisclosed iControl REST endpoint and TMOS Shell (tmsh) command may allow an authenticated attacker with resource administrator privileges to access sensitive information.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41954 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41954.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 4.9,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41954"
        },
        {
            "cve": "CVE-2026-41956",
            "cwe": {
                "id": "CWE-121",
                "name": "Stack-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Stack-based Buffer Overflow",
                    "title": "CWE-121"
                },
                {
                    "category": "description",
                    "text": "Configuring a classification profile on a UDP virtual server can cause the Traffic Management Microkernel (TMM) to terminate upon receiving certain undisclosed requests, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41956 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41956.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41956"
        },
        {
            "cve": "CVE-2026-41957",
            "cwe": {
                "id": "CWE-502",
                "name": "Deserialization of Untrusted Data"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Deserialization of Untrusted Data",
                    "title": "CWE-502"
                },
                {
                    "category": "description",
                    "text": "An authenticated remote code execution vulnerability exists in the BIG-IP and BIG-IQ Configuration utility through undisclosed vectors, excluding software versions that have reached End of Technical Support.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41957 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41957.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 8.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41957"
        },
        {
            "cve": "CVE-2026-41959",
            "cwe": {
                "id": "CWE-732",
                "name": "Incorrect Permission Assignment for Critical Resource"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incorrect Permission Assignment for Critical Resource",
                    "title": "CWE-732"
                },
                {
                    "category": "description",
                    "text": "Incorrect permission assignment vulnerabilities in BIG-IP and BIG-IQ TMOS Shell (tmsh) network diagnostics commands and BIG-IP iControl REST may allow authenticated attackers to view network status of destination systems.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-41959 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41959.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-41959"
        },
        {
            "cve": "CVE-2026-42058",
            "cwe": {
                "id": "CWE-732",
                "name": "Incorrect Permission Assignment for Critical Resource"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incorrect Permission Assignment for Critical Resource",
                    "title": "CWE-732"
                },
                {
                    "category": "description",
                    "text": "An authenticated attacker can exploit undisclosed requests to BIG-IP iControl REST to leak local user account names, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42058 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42058.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                        "baseScore": 4.3,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42058"
        },
        {
            "cve": "CVE-2026-42063",
            "cwe": {
                "id": "CWE-552",
                "name": "Files or Directories Accessible to External Parties"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Files or Directories Accessible to External Parties",
                    "title": "CWE-552"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in iControl SOAP allows authenticated users with Resource Administrator or Administrator roles to download sensitive files, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42063 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42063.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 4.9,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42063"
        },
        {
            "cve": "CVE-2026-42406",
            "cwe": {
                "id": "CWE-267",
                "name": "Privilege Defined With Unsafe Actions"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Privilege Defined With Unsafe Actions",
                    "title": "CWE-267"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in BIG-IP and BIG-IQ systems allows a highly privileged, authenticated attacker with the Certificate Manager role to modify configuration objects and execute arbitrary commands, excluding versions past End of Technical Support.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42406 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42406.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42406"
        },
        {
            "cve": "CVE-2026-42408",
            "cwe": {
                "id": "CWE-312",
                "name": "Cleartext Storage of Sensitive Information"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Cleartext Storage of Sensitive Information",
                    "title": "CWE-312"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in an undisclosed TMOS Shell (tmsh) command in BIG-IP DNS may allow a highly privileged authenticated attacker to view sensitive information.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42408 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42408.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 4.4,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42408"
        },
        {
            "cve": "CVE-2026-42409",
            "cwe": {
                "id": "CWE-476",
                "name": "NULL Pointer Dereference"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "NULL Pointer Dereference",
                    "title": "CWE-476"
                },
                {
                    "category": "description",
                    "text": "Configuring an HTTP/2 profile with an iRule using HTTP::redirect or HTTP::respond on a virtual server can cause the Traffic Management Microkernel (TMM) process to terminate due to certain request handling issues.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42409 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42409.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42409"
        },
        {
            "cve": "CVE-2026-42780",
            "cwe": {
                "id": "CWE-22",
                "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
                    "title": "CWE-22"
                },
                {
                    "category": "description",
                    "text": "A directory traversal vulnerability in BIG-IP SSL Orchestrator allows an authenticated high-privilege attacker to overwrite, delete, or corrupt arbitrary local files, affecting supported software versions.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42780 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42780.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
                        "baseScore": 4.9,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42780"
        },
        {
            "cve": "CVE-2026-42781",
            "cwe": {
                "id": "CWE-835",
                "name": "Loop with Unreachable Exit Condition ('Infinite Loop')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Loop with Unreachable Exit Condition ('Infinite Loop')",
                    "title": "CWE-835"
                },
                {
                    "category": "description",
                    "text": "Configuring embedded Packet Velocity Acceleration (ePVA) can increase resource utilization in ePVA and Traffic Management Microkernel (TMM) due to undisclosed local ethernet traffic, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42781 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42781.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42781"
        },
        {
            "cve": "CVE-2026-42919",
            "cwe": {
                "id": "CWE-121",
                "name": "Stack-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Stack-based Buffer Overflow",
                    "title": "CWE-121"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in BIG-IP systems allows an authenticated attacker with administrative access to escalate privileges and cross security boundaries, with unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42919 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42919.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
                        "baseScore": 6.7,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42919"
        },
        {
            "cve": "CVE-2026-42920",
            "cwe": {
                "id": "CWE-835",
                "name": "Loop with Unreachable Exit Condition ('Infinite Loop')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Loop with Unreachable Exit Condition ('Infinite Loop')",
                    "title": "CWE-835"
                },
                {
                    "category": "description",
                    "text": "Configuring a Client SSL profile with Allow Dynamic Record Sizing on a UDP virtual server can cause the Traffic Management Microkernel (TMM) to terminate due to undisclosed traffic issues.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42920 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42920.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42920"
        },
        {
            "cve": "CVE-2026-42924",
            "cwe": {
                "id": "CWE-78",
                "name": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
                    "title": "CWE-78"
                },
                {
                    "category": "description",
                    "text": "An authenticated attacker with Resource Administrator or Administrator roles can exploit iControl SOAP to create SNMP configuration objects, leading to privilege escalation.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42924 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42924.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42924"
        },
        {
            "cve": "CVE-2026-42930",
            "cwe": {
                "id": "CWE-35",
                "name": "Path Traversal: '.../...//'"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Path Traversal: '.../...//'",
                    "title": "CWE-35"
                },
                {
                    "category": "description",
                    "text": "An authenticated attacker with Administrator privileges may bypass Appliance mode restrictions on a BIG-IP system, including some unsupported software versions not evaluated.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42930 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42930.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
                        "baseScore": 8.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42930"
        },
        {
            "cve": "CVE-2026-42937",
            "cwe": {
                "id": "CWE-732",
                "name": "Incorrect Permission Assignment for Critical Resource"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incorrect Permission Assignment for Critical Resource",
                    "title": "CWE-732"
                },
                {
                    "category": "description",
                    "text": "Incorrect permission assignment vulnerabilities in BIG-IP and BIG-IQ TMOS Shell arp and ndp commands, as well as in BIG-IP iControl REST, may allow an authenticated attacker to access adjacent network information.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-42937 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42937.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26"
                    ]
                }
            ],
            "title": "CVE-2026-42937"
        }
    ]
}