Lucene search

K
f5F5F5:K43815022
HistoryApr 30, 2020 - 12:10 a.m.

BIG-IP crypto driver vulnerability CVE-2020-5882

2020-04-3000:10:00
support.f5.com
14

0.001 Low

EPSS

Percentile

42.7%

Under certain conditions, the Intel QuickAssist Technology (QAT) cryptography driver may produce a Traffic Management Microkernel (TMM) core file. (CVE-2020-5882)

Impact

The BIG-IP system temporarily fails to process traffic as it recovers from TMM restarting, and systems configured as part of a high availability (HA) group may fail over. This vulnerability applies to the following platforms:

  • i4000, i4600, i4800, YK i4000
  • i5000, i5600, i5800, HRC-i5000, HRC-i5800, i5820-DF
  • i7000, i7600, i7800, i7000-D, i7820-DF
  • i10000, i10600, i10800, i10000-D, HRC-i10800
  • i11000, i11600, i11800, i11000-DS, i11000-D
  • i15000, i15600, i15800, i15000-N
  • VIPRION B4400N blade
  • BIG-IP Virtual Edition (VE)

Note: BIG-IP VE cryptographic and compression offload is a licensed feature available only on the KVM hypervisor. If you have licensed this feature (a BIG-IP VE using the affected Intel QAT hardware [Lewisburg and Lewis Hill QAT devices] with an affected Intel QAT SR-IOV VF driver included in the BIG-IP VE version) then the Intel QAT PF (Lewisburg and Lewis Hill QAT devices) driver installed on the host is vulnerable. Under this very explicit KVM scenario, a BIG-IP VE is vulnerable.

0.001 Low

EPSS

Percentile

42.7%

Related for F5:K43815022