Lucene search

K
f5F5F5:K63558580
HistoryApr 30, 2020 - 12:00 a.m.

K63558580 : BIG-IP crypto driver vulnerability CVE-2020-5872

2020-04-3000:00:00
my.f5.com
14

0.001 Low

EPSS

Percentile

42.5%

Security Advisory Description

When processing TLS traffic with hardware cryptographic acceleration enabled on platforms with Intel QAT hardware, the Traffic Management Microkernel (TMM) may stop responding and cause a failover event. (CVE-2020-5872)

Impact

Hardware cryptographic acceleration fails and TMM may stop responding, which causes a failover event if the BIG-IP system is configured as part of a device group. This vulnerability applies to the following platforms:

  • i4000, i4600, i4800, YK i4000
  • i5000, i5600, i5800, HRC-i5000, HRC-i5800, i5820-DF
  • i7000, i7600, i7800, i7000-D, i7820-DF
  • i10000, i10600, i10800, i10000-D, HRC-i10800
  • i11000, i11600, i11800, i11000-DS, i11000-D
  • i15000, i15600, i15800, i15000-N
  • VIPRION B4400N blade
  • BIG-IP Virtual Edition (VE)

Note: BIG-IP VE cryptographic and compression offload is a licensed feature available only on the KVM hypervisor. If you have licensed this feature (a BIG-IP VE using the affected Intel QAT hardware [Lewisburg and Lewis Hill QAT devices] with an affected Intel QAT SR-IOV VF driver included in the BIG-IP VE version) then the Intel QAT PF (Lewisburg and Lewis Hill QAT devices) driver installed on the host is vulnerable. Under this very explicit KVM scenario, a BIG-IP VE is vulnerable.

0.001 Low

EPSS

Percentile

42.5%

Related for F5:K63558580