Big-Iq Security
by F5
Review your setup
Big-Iq Security has some exploitation signals but is generally manageable with regular updates.
What to do
- Keep this software updated
- Review your configuration for unnecessary exposure
- Check for known-vulnerable components or plugins
What Attackers Target
Vulnerabilities with high exploit probability
27.3%
Confirmed actively exploited (CISA)
27.3%
Public exploit code available
18.2%
Based on 11 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2014-6271 | 9.8 | 94.2% | Yes |
| CVE-2014-7169 | 9.8 | 90.1% | Yes |
| CVE-2014-0196 | 5.5 | 48.6% | Yes |
| CVE-2016-5022 | 9.8 | 3.1% | — |
| CVE-2015-5516 | 7.5 | 1.6% | — |
| CVE-2015-8099 | 5.9 | 1.0% | — |
| CVE-2017-6128 | 7.5 | 0.9% | — |
| CVE-2014-5209 | 5.3 | 0.7% | — |
| CVE-2016-2084 | 7.4 | 0.5% | — |
| CVE-2016-5021 | 4.9 | 0.2% | — |
| CVE-2015-7393 | 7.4 | 0.1% | — |
42
/ 100
moderate-risk
Active Threat
20/50 · Moderate
Exploit Availability
22/50 · Moderate
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.