GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959. (CVE-2009-5138)
A remote attacker may be able to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted Certificate Authority (CA) to issue new certificates.
Note: F5 Product Development has determined that BIG-IP, BIG-IQ, and Enterprise Manager versions ship with vulnerable GnuTLS code. However, the vulnerable code is not used as a server or to make outgoing connections, and is not exploitable.
For affected ARX systems, F5 recommends that you expose the management interface only on trusted networks.