Lucene search

K
f5F5SOL13219
HistoryNov 23, 2011 - 12:00 a.m.

SOL13219 - DHCP Client vulnerability CVE-2011-0997

2011-11-2300:00:00
support.f5.com
35

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.971 High

EPSS

Percentile

99.7%

Recommended action

To eliminate this vulnerability, upgrade to a version that is listed in the Versions known to be not vulnerable column in the previous table.

To mitigate this vulnerability, when configuring the AOM or SCCP for access over the network, you should use a static IP address and not obtain an IP address using DHCP.

Impact of action: None.

Supplemental Information

Note: The previous link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.

  • SOL3753: Configuring the switch card control processor so that it can be accessed over the network
  • SOL9608: Configuring the AOM so that it can be accessed over the network
  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • SOL167: Downloading software and firmware from F5
  • SOL10025: Managing BIG-IP product hotfixes (10.x)
  • SOL9502: BIG-IP hotfix matrix

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.971 High

EPSS

Percentile

99.7%