Lucene search

K
cve[email protected]CVE-2017-6162
HistoryOct 27, 2017 - 2:29 p.m.

CVE-2017-6162

2017-10-2714:29:00
CWE-119
web.nvd.nist.gov
25
f5 big-ip
tmm
tcp traffic
crash
failover
cve-2017-6162
vulnerability

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

5.5 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.6%

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, Websafe software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4, 11.2.1, in some cases TMM may crash when processing TCP traffic. This vulnerability affects TMM via a virtual server configured with TCP profile. Traffic processing is disrupted while Traffic Management Microkernel (TMM) restarts. If the affected BIG-IP system is configured to be part of a device group, it will trigger a failover to the peer device.

Affected configurations

NVD
Node
f5big-ip_local_traffic_managerRange11.5.011.5.4
OR
f5big-ip_local_traffic_managerMatch11.2.1
OR
f5big-ip_local_traffic_managerMatch11.6.0
OR
f5big-ip_local_traffic_managerMatch11.6.1
OR
f5big-ip_local_traffic_managerMatch12.0.0
OR
f5big-ip_local_traffic_managerMatch12.1.0
OR
f5big-ip_local_traffic_managerMatch12.1.1
Node
f5big-ip_application_acceleration_managerRange11.5.011.5.4
OR
f5big-ip_application_acceleration_managerMatch11.2.1
OR
f5big-ip_application_acceleration_managerMatch11.6.0
OR
f5big-ip_application_acceleration_managerMatch11.6.1
OR
f5big-ip_application_acceleration_managerMatch12.0.0
OR
f5big-ip_application_acceleration_managerMatch12.1.0
OR
f5big-ip_application_acceleration_managerMatch12.1.1
Node
f5big-ip_advanced_firewall_managerRange11.5.011.5.4
OR
f5big-ip_advanced_firewall_managerMatch11.2.1
OR
f5big-ip_advanced_firewall_managerMatch11.6.0
OR
f5big-ip_advanced_firewall_managerMatch11.6.1
OR
f5big-ip_advanced_firewall_managerMatch12.0.0
OR
f5big-ip_advanced_firewall_managerMatch12.1.0
OR
f5big-ip_advanced_firewall_managerMatch12.1.1
Node
f5big-ip_access_policy_managerRange11.5.011.5.4
OR
f5big-ip_access_policy_managerMatch11.2.1
OR
f5big-ip_access_policy_managerMatch11.6.0
OR
f5big-ip_access_policy_managerMatch11.6.1
OR
f5big-ip_access_policy_managerMatch12.0.0
OR
f5big-ip_access_policy_managerMatch12.1.0
OR
f5big-ip_access_policy_managerMatch12.1.1
Node
f5big-ip_application_security_managerRange11.5.011.5.4
OR
f5big-ip_application_security_managerMatch11.2.1
OR
f5big-ip_application_security_managerMatch11.6.0
OR
f5big-ip_application_security_managerMatch11.6.1
OR
f5big-ip_application_security_managerMatch12.0.0
OR
f5big-ip_application_security_managerMatch12.1.0
OR
f5big-ip_application_security_managerMatch12.1.1
Node
f5big-ip_link_controllerRange11.5.011.5.4
OR
f5big-ip_link_controllerMatch11.2.1
OR
f5big-ip_link_controllerMatch11.6.0
OR
f5big-ip_link_controllerMatch11.6.1
OR
f5big-ip_link_controllerMatch12.0.0
OR
f5big-ip_link_controllerMatch12.1.0
OR
f5big-ip_link_controllerMatch12.1.1
Node
f5big-ip_policy_enforcement_managerRange11.5.011.5.4
OR
f5big-ip_policy_enforcement_managerMatch11.2.1
OR
f5big-ip_policy_enforcement_managerMatch11.6.0
OR
f5big-ip_policy_enforcement_managerMatch11.6.1
OR
f5big-ip_policy_enforcement_managerMatch12.0.0
OR
f5big-ip_policy_enforcement_managerMatch12.1.0
OR
f5big-ip_policy_enforcement_managerMatch12.1.1
Node
f5big-ip_websafeMatch1.0.0

CNA Affected

[
  {
    "product": "BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, Websafe",
    "vendor": "F5 Networks, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "12.0.0 - 12.1.2"
      },
      {
        "status": "affected",
        "version": "11.6.0 &#xe2"
      },
      {
        "status": "affected",
        "version": "&#x80"
      },
      {
        "status": "affected",
        "version": "\" 11.6.1"
      },
      {
        "status": "affected",
        "version": "11.4.0 &#xe2"
      },
      {
        "status": "affected",
        "version": "\" 11.5.4"
      },
      {
        "status": "affected",
        "version": "11.2.1"
      }
    ]
  }
]

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

5.5 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.6%

Related for CVE-2017-6162