Lucene search

K
cve[email protected]CVE-2017-6160
HistoryOct 27, 2017 - 2:29 p.m.

CVE-2017-6160

2017-10-2714:29:00
web.nvd.nist.gov
22
cve-2017-6160
f5 big-ip
aam
pem
tmm restart
http request
security vulnerability

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

5.6 Medium

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.8%

In F5 BIG-IP AAM and PEM software version 12.0.0 to 12.1.1, 11.6.0 to 11.6.1, 11.4.1 to 11.5.4, a remote attacker may create maliciously crafted HTTP request to cause Traffic Management Microkernel (TMM) to restart and temporarily fail to process traffic. This issue is exposed on virtual servers using a Policy Enforcement profile or a Web Acceleration profile. Systems that do not have BIG-IP AAM module provisioned are not vulnerable. The Traffic Management Microkernel (TMM) may restart and temporarily fail to process traffic. Systems that do not have BIG-IP AAM or PEM module provisioned are not vulnerable.

Affected configurations

NVD
Node
f5big-ip_application_acceleration_managerMatch11.4.0
OR
f5big-ip_application_acceleration_managerMatch11.4.1
OR
f5big-ip_application_acceleration_managerMatch11.5.0
OR
f5big-ip_application_acceleration_managerMatch11.5.1
OR
f5big-ip_application_acceleration_managerMatch11.5.2
OR
f5big-ip_application_acceleration_managerMatch11.5.3
OR
f5big-ip_application_acceleration_managerMatch11.5.4
OR
f5big-ip_application_acceleration_managerMatch11.5.5
OR
f5big-ip_application_acceleration_managerMatch11.6.0
OR
f5big-ip_application_acceleration_managerMatch11.6.1
OR
f5big-ip_application_acceleration_managerMatch12.0.0
OR
f5big-ip_application_acceleration_managerMatch12.1.0
OR
f5big-ip_application_acceleration_managerMatch12.1.1
Node
f5big-ip_policy_enforcement_managerMatch11.4.0
OR
f5big-ip_policy_enforcement_managerMatch11.4.1
OR
f5big-ip_policy_enforcement_managerMatch11.5.0
OR
f5big-ip_policy_enforcement_managerMatch11.5.1
OR
f5big-ip_policy_enforcement_managerMatch11.5.2
OR
f5big-ip_policy_enforcement_managerMatch11.5.3
OR
f5big-ip_policy_enforcement_managerMatch11.5.4
OR
f5big-ip_policy_enforcement_managerMatch11.5.5
OR
f5big-ip_policy_enforcement_managerMatch11.6.0
OR
f5big-ip_policy_enforcement_managerMatch11.6.1
OR
f5big-ip_policy_enforcement_managerMatch12.0.0
OR
f5big-ip_policy_enforcement_managerMatch12.1.0
OR
f5big-ip_policy_enforcement_managerMatch12.1.1

CNA Affected

[
  {
    "product": "BIG-IP AAM, PEM",
    "vendor": "F5 Networks, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "12.0.0 - 12.1.1"
      },
      {
        "status": "affected",
        "version": "11.6.0 - 11.6.1"
      },
      {
        "status": "affected",
        "version": "11.4.1 - 11.5.4"
      }
    ]
  }
]

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

5.6 Medium

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.8%

Related for CVE-2017-6160