6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.053 Low
EPSS
Percentile
92.2%
Recommended action
You can eliminate this vulnerability by running a version listed in the Versions known to be not vulnerable column in the previous table. If theVersions known to be not vulnerable column does not list a version that is higher than the version you are running, then no upgrade candidate currently exists.
Mitigating this vulnerability
To mitigate this vulnerability, you should consider the following recommendations:
Consider denying access to the Configuration utility and using only the command line and tmshutility until the BIG-IP system is updated. If that is not possible, F5 recommends that you access the Configuration utility over only a secure network.
If SSL profiles are configured to use COMPAT ciphers, consider reconfiguring the profiles to use ciphers from the NATIVE SSL stack. For information about the NATIVE and COMPAT ciphers, refer to the following articles:
ARX
If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the table does not list any version in the column, then no upgrade candidate currently exists.
To mitigate this vulnerability, you should permit access to the ARX GUI only over a secure network.
Supplemental Information
support.f5.com/kb/en-us/solutions/public/0000/100/sol167.html
support.f5.com/kb/en-us/solutions/public/13000/100/sol13123
support.f5.com/kb/en-us/solutions/public/4000/600/sol4602.html
support.f5.com/kb/en-us/solutions/public/4000/900/sol4918.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9957.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9970.html